Static task
static1
Behavioral task
behavioral1
Sample
NEAS.89498d6c7143d5bf6d6970fd0b711f60.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.89498d6c7143d5bf6d6970fd0b711f60.dll
Resource
win10v2004-20231020-en
General
-
Target
NEAS.89498d6c7143d5bf6d6970fd0b711f60.exe
-
Size
349KB
-
MD5
89498d6c7143d5bf6d6970fd0b711f60
-
SHA1
92ea4cb492281db539a6b187e76b3e7a91b7b62e
-
SHA256
f86e9885d152e8417be94f3acfd4fa056468199b7b58740d4f705fa4386d1dc3
-
SHA512
3cd450e436891945bbea074281e64f022db13c2374a02e8af57dd5d2e2dcc70ac9989aa77821f86b70e429a78dc845bfb6f75b8941608351095079fd3a57141a
-
SSDEEP
3072:y9/3kcQCGeVxuvuoM9e1qrJusffKTwGT0rghLipFpWbTt1rpsyerXW:yllo/12RKTv0r+EybJsyUG
Malware Config
Signatures
Files
-
NEAS.89498d6c7143d5bf6d6970fd0b711f60.exe.dll windows:6 windows x64
ed8b62e0b49e46d02f4a3cdc377faaa2
Code Sign
0c:13:5d:00:82:1d:89:49:bd:d4:89:b0:12:5c:95:5cCertificate
IssuerCN=PCAccelerateProCompany,1.2.840.113549.1.9.1=#0c20696e626f78407063616363656c657261746570726f636f6d70616e792e636f6dNot Before17/02/2019, 00:00Not After17/02/2020, 23:59SubjectCN=PCAccelerateProCompany,1.2.840.113549.1.9.1=#0c20696e626f78407063616363656c657261746570726f636f6d70616e792e636f6d42:1a:f2:94:09:84:19:1f:52:0a:4b:c6:24:26:a7:4bCertificate
IssuerCN=AddTrust External CA Root,OU=AddTrust External TTP Network,O=AddTrust AB,C=SENot Before07/06/2005, 08:09Not After30/05/2020, 10:48SubjectCN=UTN-USERFirst-Object,OU=http://www.usertrust.com,O=The USERTRUST Network,L=Salt Lake City,ST=UT,C=USKey Usages
KeyUsageCertSign
KeyUsageCRLSign
62:5c:4d:90:8c:d5:42:fb:ab:2e:a5:73:3f:f1:54:19Certificate
IssuerCN=UTN-USERFirst-Object,OU=http://www.usertrust.com,O=The USERTRUST Network,L=Salt Lake City,ST=UT,C=USNot Before27/04/2011, 00:00Not After30/05/2020, 10:48SubjectCN=COMODO Time Stamping CA,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
2b:73:db:74:63:11:4c:5a:5b:32:4a:f2:30:57:72:49Certificate
IssuerCN=COMODO Time Stamping CA,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GBNot Before02/05/2019, 00:00Not After30/05/2020, 10:48SubjectCN=Sectigo SHA-1 Time Stamping Signer,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
ReplaceFileW
GetNamedPipeServerProcessId
GetDefaultCommConfigW
ApplicationRecoveryInProgress
CompareStringEx
GetCPInfo
IsDBCSLeadByte
GetThreadPreferredUILanguages
EnumSystemLanguageGroupsW
EnumCalendarInfoExEx
AllocConsole
SetConsoleCtrlHandler
CloseHandle
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
Sleep
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
OpenThread
SetThreadPriority
GetThreadPriority
SuspendThread
BeginUpdateResourceA
GetThreadContext
FlushInstructionCache
GetSystemInfo
VirtualAlloc
VirtualFree
VirtualQuery
VirtualProtectEx
CreateFileW
HeapSize
LCMapStringW
GetStringTypeW
SetFilePointerEx
SetStdHandle
HeapReAlloc
OpenWaitableTimerA
BackupRead
GlobalDeleteAtom
GetLongPathNameTransactedW
QueryThreadCycleTime
LoadResource
GetProcAddress
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameA
GetThreadId
GetPriorityClass
GetProcessTimes
CancelSynchronousIo
PostQueuedCompletionStatus
PeekNamedPipe
SetHandleInformation
UnlockFileEx
GetFullPathNameW
RtlCaptureStackBackTrace
ResumeThread
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapDestroy
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetStartupInfoW
GetProcessHeap
SetLastError
GetOEMCP
GetACP
IsValidCodePage
RtlUnwindEx
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
FlushFileBuffers
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
WriteFile
LoadLibraryW
LoadLibraryExW
OutputDebugStringW
MultiByteToWideChar
ExitProcess
DecodePointer
EncodePointer
IsProcessorFeaturePresent
IsDebuggerPresent
GetCommandLineA
HeapAlloc
HeapFree
GetStdHandle
GetFileType
GetModuleFileNameW
GetModuleHandleExW
WriteConsoleW
GetSystemTimeAsFileTime
RtlPcToFileHeader
RaiseException
GetLastError
user32
ShowScrollBar
SetWindowLongA
CallNextHookEx
GetForegroundWindow
DlgDirSelectExA
GetMonitorInfoA
CopyAcceleratorTableW
GetQueueStatus
VkKeyScanExW
OemKeyScan
IsCharUpperA
CharUpperA
CallMsgFilterW
IsDlgButtonChecked
SwapMouseButton
DrawTextW
advapi32
CredUnmarshalCredentialW
CloseServiceHandle
RegLoadAppKeyW
RegDeleteTreeA
RegSaveKeyA
RegQueryValueExA
RegOpenKeyExA
RegNotifyChangeKeyValue
RegCreateKeyTransactedW
RegDisablePredefinedCacheEx
RegCloseKey
GetCurrentHwProfileW
OpenEncryptedFileRawW
EncryptFileW
IsValidAcl
InitializeAcl
GetSecurityDescriptorDacl
ConvertToAutoInheritPrivateObjectSecurity
AdjustTokenPrivileges
AddMandatoryAce
AddAccessAllowedObjectAce
AccessCheckByTypeResultListAndAuditAlarmByHandleW
CredIsMarshaledCredentialA
shell32
ord192
ord21
SHGetFolderPathW
ord191
ord6
ord80
ord179
ExtractIconA
SHCreateDefaultExtractIcon
ord162
ole32
CoGetContextToken
CoCreateFreeThreadedMarshaler
CoInitializeSecurity
StgIsStorageILockBytes
StgSetTimes
CreateAntiMoniker
OleSetContainedObject
OleFlushClipboard
OleConvertOLESTREAMToIStorage
FmtIdToPropStgName
shlwapi
ColorHLSToRGB
SHQueryValueExA
UrlCreateFromPathW
UrlIsA
UrlCompareA
PathIsNetworkPathA
PathFindOnPathA
PathBuildRootW
StrIsIntlEqualA
wvnsprintfA
oledlg
ord11
OleUIPromptUserW
OleUIInsertObjectW
ord4
ord5
ord7
ord2
OleUIBusyW
ord8
Exports
Exports
HookBringWindowToTop
HookSetActiveWindow
HookSetForegroundWindow
HookSetWindowPos
Mon
Sections
.text Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 178KB - Virtual size: 189KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ