Behavioral task
behavioral1
Sample
NEAS.4910ea84bf7a1307222a7f3e658e7560.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.4910ea84bf7a1307222a7f3e658e7560.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.4910ea84bf7a1307222a7f3e658e7560.exe
-
Size
268KB
-
MD5
4910ea84bf7a1307222a7f3e658e7560
-
SHA1
988eb032d5fe6eb653d652c15b24460f350754e5
-
SHA256
f48963c67a13da16b1b1e161e055406d4fd1cfdac10fb71c402874c33d2b47ac
-
SHA512
c391f05a097629905e36b92cd1151d86dee7c76f9419d6c6df5625933a4ae08ca6152c6437644d5336724ce45112d69bbe8155087d81e8b2d6330f5c4219b4b2
-
SSDEEP
3072:EToBONvtWY9bozXYC7uZ2JkBDaqAo2vLUCPhUsSgv8y+4Dooni6x:uoevUGcuZd92tPKKKH
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.4910ea84bf7a1307222a7f3e658e7560.exe
Files
-
NEAS.4910ea84bf7a1307222a7f3e658e7560.exe.exe windows:4 windows x86
bb37d3d0e94a5cfa2e31f15a61afc450
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
GetModuleFileNameA
GetVersionExA
GetVersion
CompareStringA
GetTimeZoneInformation
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
LCMapStringA
GetCurrentProcess
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetCommandLineA
GetStartupInfoA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
RemoveDirectoryA
MoveFileA
RtlUnwind
DeleteFileA
SetEnvironmentVariableA
CreateDirectoryA
HeapFree
HeapAlloc
HeapCompact
TerminateProcess
ExitProcess
GetFileAttributesA
SetFileAttributesA
MoveFileExA
GetModuleHandleA
FormatMessageA
CopyFileA
SetFileTime
OpenFile
SetErrorMode
GetPrivateProfileStringA
WritePrivateProfileStringA
GetTickCount
GetFullPathNameA
FindFirstFileA
FindClose
MultiByteToWideChar
WideCharToMultiByte
GetLocalTime
GetTempPathA
GetShortPathNameA
CompareStringW
Sleep
GetExitCodeProcess
GetCurrentDirectoryA
SetCurrentDirectoryA
CreateProcessA
lstrcatA
lstrlenA
WinExec
LoadLibraryA
GetProcAddress
FreeLibrary
GetDiskFreeSpaceA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
CloseHandle
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetLastError
GetWindowsDirectoryA
IsBadWritePtr
GetSystemDirectoryA
advapi32
RegDeleteKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyA
RegEnumKeyExA
RegCloseKey
RegDeleteValueA
RegSetValueExA
RegOpenKeyExA
RegQueryValueA
RegOpenKeyA
RegQueryValueExA
comctl32
ord17
comdlg32
GetOpenFileNameA
gdi32
DeleteDC
GetDeviceCaps
GetSystemPaletteEntries
CreatePalette
DeleteObject
ExtTextOutA
CreateFontIndirectA
GetStockObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
RealizePalette
SelectPalette
CreateHalftonePalette
CreateDIBPatternBrush
CreateSolidBrush
SetBrushOrgEx
SetStretchBltMode
StretchDIBits
SetTextColor
SetBkMode
SetBkColor
RemoveFontResourceA
AddFontResourceA
ole32
CoGetMalloc
CoCreateInstance
OleInitialize
OleUninitialize
shell32
DragQueryFileA
DragFinish
ShellExecuteA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
DragAcceptFiles
user32
ExitWindowsEx
IsIconic
RedrawWindow
PostQuitMessage
DialogBoxParamA
AdjustWindowRectEx
PostMessageA
EndDialog
CheckDlgButton
BringWindowToTop
GetLastActivePopup
FindWindowA
RegisterClassA
SendMessageA
GetWindow
LoadCursorA
DefWindowProcA
LoadIconA
GetSysColor
ScreenToClient
GetWindowRect
GetDlgItem
EndPaint
BeginPaint
GetClientRect
FillRect
DrawTextA
GetSystemMetrics
SetTimer
KillTimer
SendDlgItemMessageA
GetFocus
GetDlgItemTextA
IsClipboardFormatAvailable
OpenClipboard
GetClipboardData
CloseClipboard
IsDlgButtonChecked
CheckRadioButton
SetFocus
GetParent
UpdateWindow
IsWindowVisible
InvalidateRect
CreateDialogParamA
GetMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
SetDlgItemTextA
SetWindowTextA
SetWindowPos
ShowWindow
DestroyWindow
CreateWindowExA
GetWindowLongA
IsWindowEnabled
EnableWindow
CallWindowProcA
ValidateRect
SetWindowLongA
GetClassNameA
MessageBoxA
PeekMessageA
wsprintfA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
VerFindFileA
Sections
UPX0 Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE