Static task
static1
Behavioral task
behavioral1
Sample
NEAS.786bb1c788e6eac570db0a08289e8300.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.786bb1c788e6eac570db0a08289e8300.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.786bb1c788e6eac570db0a08289e8300.exe
-
Size
340KB
-
MD5
786bb1c788e6eac570db0a08289e8300
-
SHA1
823b7b5a6c5fd346fec8cf80e308aa1a4d14fa5f
-
SHA256
896c80092f69486ccdd8f4e94766c2b6cbcd01037cf3bddecc64e9d3b04b7de8
-
SHA512
3144ac38fadd3b96ca92447aa49dfb80fd7660f08794d4797f658ba43aef763d069df0b624edc691b6176671605e8b66379c63ba9148f9f0a6fab955704bf9d7
-
SSDEEP
6144:rOhV7ZK9cgPvX7SuRGHWqkSkTNU4k0w4sQ5WbONU5NxWntJlZPUPTfrJig3/hJ:4byX7Su5TNUDTOa8ntq7T93/h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.786bb1c788e6eac570db0a08289e8300.exe
Files
-
NEAS.786bb1c788e6eac570db0a08289e8300.exe.exe windows:4 windows x86
6b0a296e4f755db30a0fa1fdb2f275d3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord2919
ord2818
ord858
ord860
ord823
ord6282
ord537
ord535
ord470
ord755
ord2379
ord4710
ord4234
ord324
ord1146
ord3597
ord4425
ord4627
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5280
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord4998
ord4853
ord4376
ord5265
ord540
ord800
ord1134
ord2621
ord1168
ord2514
ord641
ord1200
ord815
ord825
ord561
ord3738
ord4424
ord4622
ord4080
ord3079
ord3825
ord3831
ord3830
ord4673
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord2725
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord6283
ord1576
msvcrt
_setmbcp
atoi
atol
fread
ftell
fseek
rename
isspace
memmove
realloc
localtime
strncmp
_ftol
_splitpath
fopen
fwrite
fclose
sprintf
malloc
_mbsstr
_itoa
_mbsrchr
free
vsprintf
puts
__CxxFrameHandler
_mbscmp
_mbschr
tolower
_ismbcspace
_mbspbrk
_mbsnbicmp
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
_CxxThrowException
__dllonexit
_onexit
_except_handler3
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_strupr
_controlfp
kernel32
ExitProcess
GetSystemDirectoryA
GetPrivateProfileStringA
GetPrivateProfileIntA
DeleteFileA
CopyFileA
GetVersion
GetCurrentProcess
Sleep
GetCurrentThreadId
GetModuleFileNameA
UnlockFile
LockFile
LockFileEx
GetVersionExA
CreateFileA
CreateFileW
GetTempPathA
GetTempPathW
GetFileAttributesA
GetFileAttributesW
DeleteFileW
GetExitCodeProcess
GetFullPathNameW
GetDiskFreeSpaceA
GetDiskFreeSpaceW
LoadLibraryA
LoadLibraryW
FormatMessageA
GetProcAddress
FreeLibrary
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTime
GetSystemTimeAsFileTime
FindClose
CreateDirectoryA
FindFirstFileA
RemoveDirectoryA
FindNextFileA
MoveFileExA
SetFileAttributesA
GetModuleHandleA
GetStartupInfoA
WaitForSingleObject
CloseHandle
CreateProcessA
InitializeCriticalSection
InterlockedCompareExchange
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
MultiByteToWideChar
AreFileApisANSI
ReadFile
GetLastError
SetFilePointer
WriteFile
SetEndOfFile
FlushFileBuffers
GetFullPathNameA
CreateThread
GetFileSize
user32
GetSystemMetrics
GetClientRect
DrawIcon
LoadIconA
IsIconic
GetMessageA
EnableWindow
MessageBoxA
PostThreadMessageA
SendMessageA
FindWindowA
ExitWindowsEx
DispatchMessageA
advapi32
StartServiceA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SetServiceStatus
RegisterServiceCtrlHandlerA
RegisterEventSourceA
ReportEventA
DeregisterEventSource
ControlService
DeleteService
CreateServiceA
ChangeServiceConfig2A
OpenSCManagerA
OpenServiceA
CloseServiceHandle
StartServiceCtrlDispatcherA
QueryServiceStatus
shell32
ShellExecuteA
msvcp60
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??0logic_error@std@@QAE@ABV01@@Z
??0out_of_range@std@@QAE@ABV01@@Z
??1out_of_range@std@@UAE@XZ
??_7out_of_range@std@@6B@
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
wininet
InternetOpenUrlA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
InternetOpenA
shlwapi
PathFileExistsA
Sections
.text Size: 288KB - Virtual size: 284KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ