Static task
static1
Behavioral task
behavioral1
Sample
NEAS.4ba3af6dd090bce90369b6fb860c4ef0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.4ba3af6dd090bce90369b6fb860c4ef0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.4ba3af6dd090bce90369b6fb860c4ef0.exe
-
Size
165KB
-
MD5
4ba3af6dd090bce90369b6fb860c4ef0
-
SHA1
40462918d2652fb7ca5eb9bc5cdc5841c31d0993
-
SHA256
4af30318fc3b7d87997a099c7d22acf90d260792b26c57bf6e301ca5f476db23
-
SHA512
3f4ea980637aa49cd0b86b4279a41d0a6962079723307f9f96766c34b8c67db421e798d0bedadaed92154b55047debe9cc0ea3eeb36cdcf63ec6ff03eb393350
-
SSDEEP
3072:ETqdfukefpBRn/OcBP8qimXNTu98k/GbRKfFK59XaDtt6WSSeZmg8XvYj4:ETqne/pGTGqKoGlKN8ZsjSd2gj4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.4ba3af6dd090bce90369b6fb860c4ef0.exe
Files
-
NEAS.4ba3af6dd090bce90369b6fb860c4ef0.exe.exe windows:1 windows x86
febfa014c13c473b7c9c19ff8c3c5220
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
crypt32
CryptBinaryToStringW
kernel32
GetProcAddress
LoadLibraryA
RtlUnwind
VirtualProtect
VerifyVersionInfoW
SetLastError
GetModuleHandleA
GetLastError
GetStdHandle
MultiByteToWideChar
LoadLibraryW
FreeLibrary
LocalFree
LocalAlloc
WriteConsoleW
FormatMessageW
GetModuleHandleW
lstrcpyW
lstrcmpW
lstrcatW
lstrcmpiW
QueryPerformanceCounter
crtdll
__GetMainArgs
exit
raise
signal
user32
LoadStringW
framedyn
??1CHString@@QAE@XZ
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 7KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 144KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 493B - Virtual size: 493B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE