DirectXFileCreate
DllCanUnloadNow
DllGetClassObject
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.775cbf74c6f5b018160398e6e86838f0.dll
Resource
win10v2004-20231023-en
Target
NEAS.775cbf74c6f5b018160398e6e86838f0.exe
Size
197KB
MD5
775cbf74c6f5b018160398e6e86838f0
SHA1
23ebecd7c66bd32e9d57e61983c444ed3bde6de4
SHA256
bfc68fafd6c807eb51dab68762d43e6627767859c677a0b4c8ef56ed62b26ff1
SHA512
19af907e346843994a96ee0113932a8437879770f62fbc1d5825bf3554977788cd32386c93d2b4cb0b8d03c385e7afc119c4407041a5fee862ebbb111007c9cb
SSDEEP
3072:WV2QPKA57Nf61bR2RbSUDFEZGVSYCmo9fihpyPCIyXBJzbcToQ:RQP56qIYaihpy2zp
Checks for missing Authenticode signature.
resource |
---|
NEAS.775cbf74c6f5b018160398e6e86838f0.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
memcpy
_except_handler4_common
_initterm
malloc
_amsg_exit
_XcptFilter
vsprintf_s
_vscprintf
free
setlocale
_strdup
isalpha
atol
atof
isspace
isalnum
isdigit
sscanf_s
isxdigit
_purecall
memcmp
memset
LockResource
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
Sleep
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapCreate
MoveFileA
ReadFile
SetFilePointer
WriteFile
GetTempFileNameA
DeleteFileA
WaitForMultipleObjects
CreateEventA
InitializeCriticalSection
EnterCriticalSection
SetEvent
WaitForSingleObject
LeaveCriticalSection
DeleteCriticalSection
CloseHandle
lstrcmpiA
lstrcmpA
lstrlenA
FindResourceA
LoadResource
CreateThread
SizeofResource
FreeResource
CreateFileA
GetFileSize
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
LoadLibraryA
GetProcAddress
DirectXFileCreate
DllCanUnloadNow
DllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ