Static task
static1
Behavioral task
behavioral1
Sample
NEAS.57c29a3683b3e2d02f450b3978fe2cf0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.57c29a3683b3e2d02f450b3978fe2cf0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.57c29a3683b3e2d02f450b3978fe2cf0.exe
-
Size
344KB
-
MD5
57c29a3683b3e2d02f450b3978fe2cf0
-
SHA1
7cc3299ad199b6511181c17133c0a543be3b5076
-
SHA256
f2396a936b09217225edfbe425107a55d6c1cb93f5641e60c4aedaca49c52919
-
SHA512
e9e3bd23571a74c835a65b4045cd585aa1d6f8302da9831058ce9108bd08b4ebfd3208a1705de6dd5b3079501c51bb6496e3b9e1673bc316e520165199568b1b
-
SSDEEP
6144:qUm9/tPiADdA2hy0gcZoHkmwhlUHzIwcUQH3VgcJfdj6zJnoAP/OQYZZ8kL/:qUm9/xi92Q07h8OXFfdj6zJ5mZt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.57c29a3683b3e2d02f450b3978fe2cf0.exe
Files
-
NEAS.57c29a3683b3e2d02f450b3978fe2cf0.exe.exe windows:4 windows x86
559e88246a166c4a117d3e6feeba3644
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyA
GetUserNameA
EqualSid
CopySid
GetLengthSid
SetSecurityDescriptorDacl
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
AllocateAndInitializeSid
RegCreateKeyA
RegSetValueExA
user32
MsgWaitForMultipleObjects
PeekMessageA
SendMessageA
FindWindowA
GetForegroundWindow
GetCapture
GetClipboardOwner
GetQueueStatus
GetCursorPos
kernel32
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
HeapSize
InterlockedExchange
RtlUnwind
GetLocaleInfoA
SetFilePointer
GetCPInfo
GetOEMCP
GetTickCount
ReadFile
SetConsoleMode
GetConsoleMode
GetStdHandle
WriteFile
FreeLibrary
LoadLibraryA
GetProcAddress
CloseHandle
SetEvent
GetOverlappedResult
WaitForSingleObject
GetLastError
CreateEventA
CreateThread
GetVersionExA
GetSystemDirectoryA
FormatMessageA
GetSystemTimeAdjustment
GetSystemTime
GetProcessTimes
GetCurrentProcess
GetThreadTimes
GetCurrentThread
GlobalMemoryStatus
QueryPerformanceCounter
GetCurrentProcessId
FindClose
FindNextFileA
FindFirstFileA
GetWindowsDirectoryA
LocalFree
WaitNamedPipeA
CreateFileA
CreateNamedPipeA
ConnectNamedPipe
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
LocalAlloc
GetCurrentThreadId
GetFileType
CreateProcessA
SetHandleInformation
CreatePipe
OpenProcess
ClearCommBreak
SetCommTimeouts
SetCommState
GetCommState
SetCommBreak
ReleaseMutex
CreateMutexA
DeleteFileA
GetEnvironmentVariableA
GetLocalTime
GetModuleFileNameA
GetTimeFormatA
GetDateFormatA
HeapAlloc
HeapReAlloc
HeapFree
ExitProcess
GetModuleHandleA
TerminateProcess
GetSystemTimeAsFileTime
GetCommandLineA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
FlushFileBuffers
WideCharToMultiByte
GetTimeZoneInformation
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
LCMapStringA
LCMapStringW
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetStdHandle
GetACP
Sections
.text Size: 248KB - Virtual size: 246KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ