Behavioral task
behavioral1
Sample
NEAS.afdae15aef30c308a06cf582ff77e5e0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.afdae15aef30c308a06cf582ff77e5e0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.afdae15aef30c308a06cf582ff77e5e0.exe
-
Size
480KB
-
MD5
afdae15aef30c308a06cf582ff77e5e0
-
SHA1
7be91cbfe76c7c1dabbb5012518855741d645f2d
-
SHA256
afee30ebe1f8b2eb4a53e72d7592c070b5249a40c96264208757fb0d0a6fe7b0
-
SHA512
ca83969e5223f332ebb8a268ca4ada5cf639c97af76462c548414e98b6e77ec1d5e8bac87039bcf571885d8deede6a9dc0d124e8f1cd5972e57f4e040228cb48
-
SSDEEP
12288:0WmaOzE94Gu7HD8jNgOb2Z70xWfMWpdNnq49lcZS1g:0sOzE94GoHYBb2vfNpdxq4IZw
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.afdae15aef30c308a06cf582ff77e5e0.exe
Files
-
NEAS.afdae15aef30c308a06cf582ff77e5e0.exe.exe windows:4 windows x86
7b5c48b3bd987abbc75072782da9ead1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
d3dx9_30
D3DXCreateTextureFromFileInMemoryEx
kernel32
Sleep
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
UnregisterClassA
MessageBoxA
gdi32
GetDeviceCaps
winspool.drv
OpenPrinterA
advapi32
SetSecurityDescriptorDacl
shell32
ShellExecuteA
winmm
timeGetTime
d3d9
Direct3DCreate9
setupapi
SetupDiDestroyDeviceInfoList
ole32
CoInitialize
oleaut32
VariantClear
Sections
.text Size: - Virtual size: 532KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.vmp1 Size: 472KB - Virtual size: 468KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE