Static task
static1
Behavioral task
behavioral1
Sample
NEAS.200f1de01f8797ae427f48f531ebb230.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.200f1de01f8797ae427f48f531ebb230.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.200f1de01f8797ae427f48f531ebb230.exe
-
Size
196KB
-
MD5
200f1de01f8797ae427f48f531ebb230
-
SHA1
58ee448058b4972b1126c5c6c366729259577e3e
-
SHA256
1d8875b84831a5821ce0cea12ee4c67ae434d29fb49112035ed5983b8d0d4c41
-
SHA512
b91b6b9401e3342da776b965e8359ec23b60a77c2f132b8840ae354e0962a55de57a1b4b46ac4d2aeaaddd7468143a2cf21a7e23b30dff282a2b0fd7a977dedf
-
SSDEEP
3072:dMEhTdciRFr3XLuPHBYdIJ9r3B977OG028hE3PR7f6nUJHobQjoXNx8UQWb:5TciRF3u/ydIiGwjmfsXN2U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.200f1de01f8797ae427f48f531ebb230.exe
Files
-
NEAS.200f1de01f8797ae427f48f531ebb230.exe.exe windows:4 windows x86
3159a8a10446f6ab0b60feb3ef45eeb1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetConnectionDialog1A
kernel32
GetTimeZoneInformation
GetSystemTime
GetLocalTime
RaiseException
TerminateProcess
HeapFree
ExitProcess
HeapAlloc
GetACP
HeapReAlloc
HeapSize
GetOEMCP
GetCommandLineA
RtlUnwind
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetProcessVersion
GetCPInfo
HeapDestroy
HeapCreate
VirtualFree
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentVariableA
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetFileType
DeleteFileA
WinExec
LoadLibraryA
GetProcAddress
lstrcpynA
GetShortPathNameA
GetDriveTypeA
GetLastError
RemoveDirectoryA
CloseHandle
CreateFileA
CreateDirectoryA
GetCurrentDirectoryA
FreeLibrary
GetModuleFileNameA
SetFilePointer
ReadFile
FindFirstFileA
FindClose
MoveFileExA
WritePrivateProfileStringA
TlsSetValue
TlsGetValue
LocalReAlloc
LeaveCriticalSection
EnterCriticalSection
GlobalReAlloc
DeleteCriticalSection
TlsFree
GlobalHandle
LocalAlloc
TlsAlloc
InitializeCriticalSection
MulDiv
GlobalFlags
GetFileAttributesA
SetEndOfFile
FlushFileBuffers
CopyFileA
GetTempPathA
WriteFile
InterlockedDecrement
LocalFree
WideCharToMultiByte
lstrcatA
InterlockedIncrement
GetVersion
GlobalFindAtomA
GlobalGetAtomNameA
GlobalAddAtomA
lstrcpyA
lstrcmpiA
GlobalDeleteAtom
lstrcmpA
LockResource
GetCurrentThread
GetCurrentThreadId
FindResourceA
LoadResource
GlobalLock
GlobalAlloc
GlobalFree
GetVersionExA
GlobalUnlock
GetModuleHandleA
LoadLibraryExA
GetWindowsDirectoryA
SetErrorMode
lstrlenA
GetCurrentProcess
MultiByteToWideChar
CreateProcessA
WaitForSingleObject
GetStartupInfoA
GetSystemDirectoryA
IsBadCodePtr
SetLastError
GetStringTypeW
IsBadReadPtr
user32
DrawTextA
GrayStringA
GetClassNameA
PtInRect
TabbedTextOutA
LoadCursorA
GetSysColorBrush
DestroyMenu
SetWindowTextA
IsDialogMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetClientRect
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetMessageA
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostMessageA
PostQuitMessage
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetDC
ReleaseDC
wsprintfA
GetSystemMetrics
PeekMessageA
TranslateMessage
DispatchMessageA
EnableWindow
MessageBoxA
SendMessageA
LoadIconA
DestroyIcon
LoadStringA
ClientToScreen
CreateWindowExA
ShowWindow
GetClassLongA
SetWindowLongA
GetWindow
CopyRect
GetWindowRect
SetWindowPos
UnregisterClassA
gdi32
CreateBitmap
GetDeviceCaps
SetTextColor
SetBkColor
GetClipBox
SaveDC
DeleteDC
SelectObject
GetStockObject
RestoreDC
SetMapMode
OffsetViewportOrgEx
SetViewportExtEx
SetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
SetWindowExtEx
AddFontResourceA
DeleteObject
PtVisible
RectVisible
ExtTextOutA
Escape
TextOutA
CreateScalableFontResourceA
GetObjectA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
GetUserNameA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
shell32
SHGetMalloc
SHGetPathFromIDListA
Shell_NotifyIconA
SHGetSpecialFolderLocation
ShellExecuteA
comctl32
ord17
ole32
OleUninitialize
OleInitialize
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ