Static task
static1
Behavioral task
behavioral1
Sample
NEAS.465b25938be00f208e36267b2b120c20.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.465b25938be00f208e36267b2b120c20.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.465b25938be00f208e36267b2b120c20.exe
-
Size
44KB
-
MD5
465b25938be00f208e36267b2b120c20
-
SHA1
5e5dec00ddeb719651373f74b222d3158a62eb1c
-
SHA256
16593020a8a8792a4afa76642d9da5ca20d1480164c1f2cf73d12d8953df21c3
-
SHA512
1b871341c8f203c0df913db937ab0140f340f45a913513332eb806b19b07a36b4c8868d914b3b65140e2fcd8863c52c3cce3d9cc379ad8830535e2e267844e9b
-
SSDEEP
768:v4h7HdBfpNmp/sPWwtlJ1wj62YFGPfcY5HPO0J:vOdBmpWWw92W2XPfcY5HPO0J
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.465b25938be00f208e36267b2b120c20.exe
Files
-
NEAS.465b25938be00f208e36267b2b120c20.exe.exe windows:4 windows x86
b3de0540ead9eb08c020446a595d6e4c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__p__commode
__p__fmode
__set_app_type
_adjust_fdiv
_controlfp
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
memset
fopen
fseek
fread
memcpy
_except_handler3
fclose
kernel32
GetModuleHandleA
ExitProcess
VirtualFree
CreateFileMappingA
GetLastError
MapViewOfFile
UnmapViewOfFile
CloseHandle
VirtualAlloc
VirtualProtect
GetModuleFileNameA
Sleep
GetStartupInfoA
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 826B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ