Static task
static1
Behavioral task
behavioral1
Sample
NEAS.aabab06782624c51cc5314521e58fd30.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.aabab06782624c51cc5314521e58fd30.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.aabab06782624c51cc5314521e58fd30.exe
-
Size
210KB
-
MD5
aabab06782624c51cc5314521e58fd30
-
SHA1
040e59ff305a501357693883002bd5702280df90
-
SHA256
caaa2700505f809d9dd054915b35eb2ee71a2393e1386d8fe5cc976ae563b368
-
SHA512
8a2232a3984310daf8f8ff9bc5b3605c872c47189c83fecb7ac755f95c911158a834421deb65a2cd4e9582dd829010258f818e5d3782ace91176a944e7a85d12
-
SSDEEP
3072:HJI+O5HNkDxtVagroHSCpNce3oPOM7TC7BbCk+dZpp5bdAXPVaefq4Nxi/3:G5YRjBh3C7dULPiPVBg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.aabab06782624c51cc5314521e58fd30.exe
Files
-
NEAS.aabab06782624c51cc5314521e58fd30.exe.exe windows:4 windows x86
291e66575f7eab098d6da15fc612df8e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDrives
ExitProcess
SetCurrentDirectoryW
GetModuleFileNameA
SetUnhandledExceptionFilter
GetFileAttributesW
SleepEx
GlobalDeleteAtom
GetExpandedNameW
lstrcpyW
GetProcAddress
CreateSemaphoreW
FileTimeToSystemTime
GetCurrentThread
GetProcessHeap
SearchPathA
GetNamedPipeInfo
CreatePipe
CreateEventW
GetModuleHandleA
MoveFileW
GetEnvironmentStringsW
GetNumberFormatA
GetLocaleInfoA
GetLocaleInfoW
GetTempPathA
GetLogicalDriveStringsW
ExpandEnvironmentStringsW
user32
SetDlgItemTextA
DefDlgProcA
GetClassLongA
PostQuitMessage
SetWindowLongW
LoadBitmapW
MessageBeep
CharUpperW
LoadMenuW
GetMessageA
CallWindowProcW
GetCursorPos
PostMessageW
GetCaretPos
CreateDesktopW
gdi32
CreateDCW
ColorCorrectPalette
GetRgnBox
SetTextAlign
GetTextColor
GetEnhMetaFileDescriptionA
UnrealizeObject
SetRectRgn
GetFontData
GetCharacterPlacementW
WidenPath
GetTextMetricsA
GetCharacterPlacementA
RemoveFontResourceExA
PaintRgn
PtVisible
LPtoDP
EndDoc
advapi32
RegOpenKeyExW
RegOpenKeyA
RegEnumValueA
RegEnumValueW
RegSaveKeyA
RegOpenKeyA
shell32
SHGetFileInfoA
SHGetFolderPathA
ole32
CoUninitialize
CoGetDefaultContext
CLSIDFromProgID
CoGetCurrentProcess
inetcomm
MimeOleGetFileInfo
EssContentHintEncodeEx
MimeOleGenerateCID
HrAthGetFileName
Sections
.ic Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.UNw Size: 2KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.NDmj Size: 3KB - Virtual size: 378KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xvpfQY Size: 512B - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cEMrQ Size: 4KB - Virtual size: 271KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.AxGj Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.FiaGd Size: 5KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Nfre Size: 2KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ctr Size: 3KB - Virtual size: 438KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.HBzd Size: 1KB - Virtual size: 466KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ