Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d9671b3d307753858a8078a60a9038a0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.d9671b3d307753858a8078a60a9038a0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.d9671b3d307753858a8078a60a9038a0.exe
-
Size
536KB
-
MD5
d9671b3d307753858a8078a60a9038a0
-
SHA1
63952ff1d999f2d35c975669d48a7fa9ab7d7706
-
SHA256
58966f889a142208dd24ba231c1a230023a0755752729e87b53c48547be5eda2
-
SHA512
be5501eeb607473df98baa6635455a181f8b6c352259df5f5f307b68d1b92687bd811b72d8a12d07fc9aefa8674ce3ce367c8bd2856dbbf1e9ff9083fcc2030c
-
SSDEEP
12288:DzJNb6EVo6ndmGkiBSnVQIa0Kx3d2K3zJ:D9NbuImGHBSnza0st2Kd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.d9671b3d307753858a8078a60a9038a0.exe
Files
-
NEAS.d9671b3d307753858a8078a60a9038a0.exe.exe windows:4 windows x86
ea3bc97f2e36f15329791819d482e1a4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetCPInfo
GetOEMCP
SetErrorMode
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
ExitThread
CreateThread
ExitProcess
HeapSize
SetStdHandle
GetFileType
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GlobalReAlloc
GetACP
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
GetTimeZoneInformation
SetHandleCount
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
TlsGetValue
GlobalFlags
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
WritePrivateProfileStringA
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
SuspendThread
ResumeThread
CreateEventA
GetFullPathNameA
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
MoveFileA
InterlockedDecrement
GetModuleFileNameW
GetFileTime
FileTimeToLocalFileTime
GetCurrentProcessId
GetThreadLocale
InterlockedIncrement
GetCurrentThreadId
GlobalGetAtomNameA
GlobalFindAtomA
GlobalDeleteAtom
SetLastError
lstrcmpW
GetModuleHandleA
GetVersionExA
GlobalFree
GetFileSize
FileTimeToSystemTime
WriteFile
GetFileAttributesA
ReadFile
SetFilePointer
CreateFileA
GetTickCount
LocalFree
GetCurrentProcess
GetCurrentThread
FormatMessageA
GetLocalTime
GetModuleFileNameA
LoadLibraryA
OutputDebugStringA
lstrcpyA
DeleteAtom
GlobalAddAtomA
GetVersion
CompareStringA
InterlockedExchange
CompareStringW
lstrlenA
DeleteFileA
OpenFile
CopyFileA
CreateDirectoryA
TerminateThread
WaitForSingleObject
WinExec
GetWindowsDirectoryA
lstrcpynA
Sleep
DeleteCriticalSection
FreeLibrary
GetProcAddress
LoadLibraryExA
InitializeCriticalSection
CloseHandle
GetLastError
CreateMutexA
GlobalUnlock
GlobalLock
GlobalAlloc
MulDiv
FreeResource
SetEvent
GetDiskFreeSpaceExA
GetVolumeInformationA
GetDriveTypeA
MultiByteToWideChar
RemoveDirectoryA
FindClose
FindNextFileA
FindFirstFileA
FindResourceA
LoadResource
LockResource
SizeofResource
IsDebuggerPresent
WideCharToMultiByte
user32
InvalidateRgn
UnregisterClassA
GetNextDlgGroupItem
GetDCEx
LockWindowUpdate
RegisterClipboardFormatA
PostThreadMessageA
TranslateAcceleratorA
ShowOwnedPopups
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
WaitMessage
DestroyMenu
TranslateMessage
ValidateRect
EndPaint
BeginPaint
GetWindowDC
GetWindowThreadProcessId
CharNextA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetMenuState
GetMenuStringA
SendDlgItemMessageA
WinHelpA
IsChild
GetClassNameA
GetFocus
GetForegroundWindow
GetLastActivePopup
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
SetForegroundWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
DeferWindowPos
DefWindowProcA
GetWindowPlacement
GetSysColorBrush
GetWindowTextA
GetWindow
SetFocus
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindowEnabled
EndDialog
PeekMessageA
MessageBoxA
LoadStringA
SetCursor
DrawFocusRect
RemovePropA
GetPropA
SetPropA
GetWindowLongA
IsWindowVisible
DestroyIcon
DrawStateA
FrameRect
SetWindowPos
SetWindowLongA
CallWindowProcA
EndDeferWindowPos
EqualRect
BeginDeferWindowPos
DrawIconEx
GetClassLongA
TrackPopupMenuEx
GetMenuItemInfoA
IsWindow
EnableMenuItem
GetKeyState
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
SetRectEmpty
CheckMenuItem
InsertMenuA
GetDlgItem
SetMenu
IntersectRect
LoadMenuA
LoadCursorA
GetDesktopWindow
SystemParametersInfoA
RegisterWindowMessageA
FillRect
SetRect
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ScreenToClient
WindowFromPoint
GetCursorPos
ReleaseCapture
ClientToScreen
DispatchMessageA
GetMessageA
PtInRect
SetCapture
GetCapture
DrawFrameControl
SetParent
CopyAcceleratorTableA
TranslateMDISysAccel
DrawMenuBar
GetSysColor
IsRectEmpty
KillTimer
InvalidateRect
DefFrameProcA
UnpackDDElParam
ReuseDDElParam
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
GetWindowTextLengthA
BringWindowToTop
SetTimer
InflateRect
CharUpperA
UpdateWindow
DrawIcon
GetSystemMetrics
IsIconic
GetDlgCtrlID
OffsetRect
RemoveMenu
ModifyMenuA
GetSystemMenu
GetMenuItemID
GetSubMenu
GetMenuItemCount
GetMenu
LoadIconA
wsprintfA
LoadBitmapA
MessageBeep
AppendMenuA
PostMessageA
GetWindowRect
GetParent
ReleaseDC
CopyRect
GetClientRect
GetDC
SendMessageA
EnableWindow
GetNextDlgTabItem
gdi32
GetWindowExtEx
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetTextExtentPoint32A
GetViewportExtEx
PatBlt
SetRectRgn
CombineRgn
GetMapMode
GetCharWidthA
CreateFontA
GetRgnBox
SetBkMode
RestoreDC
SaveDC
GetTextColor
GetBkColor
CreateRectRgn
SelectClipRgn
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
SetMapMode
CreateRectRgnIndirect
GetDeviceCaps
SetBkColor
SetTextColor
DeleteObject
SetDIBitsToDevice
StretchDIBits
CreatePatternBrush
SetGraphicsMode
GetGraphicsMode
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetPixel
SetPixel
CreateFontIndirectA
GetStockObject
CreatePen
SelectObject
CreateCompatibleBitmap
GetClipBox
Ellipse
SetBrushOrgEx
CreateBrushIndirect
CreateBitmap
CreateSolidBrush
BitBlt
CreateCompatibleDC
GetObjectA
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
RegOpenKeyExA
shell32
DragQueryFileA
SHFileOperationA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteExA
ShellExecuteA
DragFinish
comctl32
ImageList_GetIcon
InitCommonControlsEx
ImageList_Draw
shlwapi
PathFindExtensionA
PathStripToRootA
PathIsUNCA
PathFindFileNameA
ColorAdjustLuma
UrlUnescapeA
oledlg
ord8
ole32
CreateILockBytesOnHGlobal
CoUninitialize
StgCreateDocfileOnILockBytes
CoTaskMemFree
CoInitialize
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
OleLockRunning
CoGetClassObject
StgOpenStorageOnILockBytes
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
oleaut32
SysAllocString
SafeArrayDestroy
VariantCopy
OleCreateFontIndirect
SysAllocStringLen
SysAllocStringByteLen
SysFreeString
SysStringLen
VariantChangeType
VariantClear
VariantInit
VariantTimeToSystemTime
SystemTimeToVariantTime
ws2_32
closesocket
accept
socket
select
gethostbyname
htonl
htons
inet_addr
WSACleanup
WSASetLastError
connect
sendto
recvfrom
WSAAsyncSelect
send
recv
WSAStartup
WSAGetLastError
bind
wininet
InternetCanonicalizeUrlA
InternetCrackUrlA
Sections
.text Size: 372KB - Virtual size: 371KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 100KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
� Size: 240KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE