Static task
static1
Behavioral task
behavioral1
Sample
NEAS.593be72f862e698b46977a58f7e5a240.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.593be72f862e698b46977a58f7e5a240.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.593be72f862e698b46977a58f7e5a240.exe
-
Size
216KB
-
MD5
593be72f862e698b46977a58f7e5a240
-
SHA1
8f87375a8fd9c6c63946567f2333eba9b1ed3dfa
-
SHA256
cf49d25e52a91fd3704e92273a36fddd2f36e0a8c2f0e26c0cba9a791b3d0666
-
SHA512
43f176bc0b09a30ea1f39af03a62d48001b27f9ec54a2617c7be2dcd666b1a6e1eb2cd5fb2c8b6eca738b3b2d5df278e1ecbd6e3ee01b819cf3b2d2503efd88c
-
SSDEEP
6144:KJENkLQmioc9QXqHjyau0+fsSS14A2pdgPUL0:KaNkLQiUytsSS14dpdgX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.593be72f862e698b46977a58f7e5a240.exe
Files
-
NEAS.593be72f862e698b46977a58f7e5a240.exe.exe windows:5 windows x86
d896f62e806566588294460ab284cef9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msi
ord103
ord31
ord159
ord160
ord170
ord163
ord91
ord124
ord8
ord17
ord185
ord23
kernel32
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GlobalGetAtomNameA
GetModuleHandleW
InterlockedIncrement
WritePrivateProfileStringA
GetCurrentDirectoryA
GlobalFlags
lstrcmpW
GlobalFindAtomA
GetCPInfo
GetOEMCP
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
HeapAlloc
HeapFree
GetCommandLineA
LocalAlloc
RtlUnwind
RaiseException
HeapReAlloc
VirtualAlloc
Sleep
ExitProcess
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetStdHandle
GetFileType
GetTimeZoneInformation
GetACP
IsValidCodePage
VirtualFree
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetDriveTypeA
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
SetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
SetErrorMode
InterlockedDecrement
GetModuleFileNameW
GetCurrentProcessId
GlobalAddAtomA
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
CompareStringA
InterlockedExchange
lstrcmpA
FreeLibrary
GetModuleHandleA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
GetFileTime
GetFileSizeEx
GetFileAttributesA
SetFileAttributesA
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileAttributesExA
GetProcAddress
CreateFileA
GetModuleFileNameA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
CloseHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
LoadLibraryA
MultiByteToWideChar
SetLastError
FileTimeToLocalFileTime
FileTimeToSystemTime
GetVersionExA
lstrlenA
GetTempPathA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
FindClose
FindNextFileA
GetLastError
FindFirstFileA
DeleteFileA
CopyFileA
GetStartupInfoA
user32
UnregisterClassA
DestroyMenu
WinHelpA
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetClientRect
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetCapture
ClientToScreen
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowTextA
UnhookWindowsHookEx
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
SendMessageA
ModifyMenuA
EnableMenuItem
CheckMenuItem
ShowWindow
RegisterWindowMessageA
LoadIconA
PostQuitMessage
PostMessageA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
CharUpperA
GetSystemMetrics
gdi32
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetClipBox
GetStockObject
RectVisible
SetMapMode
PtVisible
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
GetDeviceCaps
DeleteObject
TextOutA
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegDeleteKeyA
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
shlwapi
PathIsUNCA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
oleaut32
VariantChangeType
VariantClear
VariantInit
Sections
.text Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ