Behavioral task
behavioral1
Sample
NEAS.cce763aafbbf4a3131b1ffb1bc607570.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.cce763aafbbf4a3131b1ffb1bc607570.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.cce763aafbbf4a3131b1ffb1bc607570.exe
-
Size
130KB
-
MD5
cce763aafbbf4a3131b1ffb1bc607570
-
SHA1
99d64a26f59d675685935c57e8ec7deb660116bd
-
SHA256
50c658a81f892a0bdc83b37f438240eb39f5343683a42439259cf0864698f2e5
-
SHA512
c524158eb0be0d8b5e706c38a561514c128a8b57385fa5476409f1e638ea09c62fb3341cc4335ecc4c482725cfe2ebda2245dca2e99fef8d6ae47a3ef196db79
-
SSDEEP
384:I2+sTimx3/RoL7p9MAKmjQxv8Timx0XWGFatkvQR8uzHKdu8h+0S1tdWUyTHA:7+PrL7QAKO2nyd6urKmsTHA
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.cce763aafbbf4a3131b1ffb1bc607570.exe
Files
-
NEAS.cce763aafbbf4a3131b1ffb1bc607570.exe.exe windows:5 windows x86
a61ba93a22191636008350381dfd1d6d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetProcAddress
HeapCreate
HeapAlloc
GetACP
ExitProcess
FreeLibrary
advapi32
RegQueryValueExA
RegOpenKeyA
GetUserNameA
CopySid
GetLengthSid
gdi32
IntersectClipRect
ExcludeClipRect
UpdateColors
DeleteObject
TextOutA
SetBkColor
SetTextColor
Rectangle
CreateSolidBrush
GetStockObject
CreateFontIndirectA
GetTextExtentExPointA
GetTextMetricsA
CreateFontA
imm32
ImmGetCompositionStringW
ImmSetCompositionFontA
ImmGetContext
ImmSetCompositionWindow
msacm32
acmMetrics
acmStreamOpen
user32
GetMessageA
DefWindowProcA
PostQuitMessage
GetDoubleClickTime
GetQueueStatus
LoadIconA
RegisterClassA
Sections
UPX0 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE