crashHandler
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.39b6f4e66247fbf040e13158e1848710.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.39b6f4e66247fbf040e13158e1848710.dll
Resource
win10v2004-20231023-en
General
-
Target
NEAS.39b6f4e66247fbf040e13158e1848710.exe
-
Size
334KB
-
MD5
39b6f4e66247fbf040e13158e1848710
-
SHA1
39840d2138f89b1c9aa9c5f95e5348eb5113dbcf
-
SHA256
2cef66eb23a980f62f86bf71c874960d570e71490014ee92079ba88661119de8
-
SHA512
11f34e279609aacf2d478e00ee819ac3bfeb72986635e2f4260d7f19ee308eb53d653f0a5305fdf3bb8957f50280d54953bfcf16033d0a946f519d159c3d666b
-
SSDEEP
6144:XgU0BDu+LwapDCMowkCELZEHFA3IpbXBTY7AhwdKAWTno8g5:IDNcdT9EHRg7qHno
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.39b6f4e66247fbf040e13158e1848710.exe
Files
-
NEAS.39b6f4e66247fbf040e13158e1848710.exe.dll windows:5 windows x64
1568f740ef133485884e1f03dc82b6f5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
oleacc
AccessibleObjectFromWindow
AccessibleObjectFromPoint
kernel32
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
lstrlenA
CreateEventA
WaitForSingleObject
SetEvent
GetProcAddress
LoadLibraryA
FreeLibrary
LocalFree
OpenProcess
CloseHandle
CreateToolhelp32Snapshot
Thread32First
Thread32Next
GetModuleHandleA
TerminateProcess
GetTickCount
GetCurrentProcessId
LoadLibraryExA
GetCommandLineA
GetCurrentThreadId
GetCurrentProcess
FlushInstructionCache
SetLastError
RaiseException
DeleteCriticalSection
LoadLibraryExW
VirtualQuery
VirtualFree
VirtualAlloc
GetSystemInfo
LeaveCriticalSection
HeapReAlloc
SetThreadContext
HeapAlloc
HeapFree
Sleep
HeapDestroy
HeapCreate
OpenThread
VirtualProtect
SuspendThread
ResumeThread
ResetEvent
GetNamedPipeHandleStateA
CreateFileW
WriteConsoleW
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
LoadLibraryW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
QueryPerformanceCounter
GetEnvironmentStringsW
RtlUnwindEx
FreeEnvironmentStringsW
GetModuleFileNameA
GetStartupInfoW
GetFileType
SetHandleCount
GetStringTypeW
GetLocaleInfoW
GetModuleFileNameW
GetStdHandle
WriteFile
FlsAlloc
FlsFree
FlsGetValue
IsValidCodePage
GetOEMCP
GetACP
GetVersion
HeapSetInformation
ExitProcess
GetModuleHandleW
RtlCaptureContext
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
GetLastError
CompareStringW
GetCPInfo
GetThreadContext
FlushFileBuffers
LocalAlloc
HeapSize
GetProcessHeap
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeCriticalSection
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
FlsSetValue
RtlPcToFileHeader
RtlLookupFunctionEntry
LCMapStringW
user32
IsWindowVisible
GetWindowLongA
CallNextHookEx
RegisterWindowMessageA
CallWindowProcA
CreateWindowExA
GetWindowLongPtrA
SetWindowLongPtrA
DestroyWindow
DefWindowProcA
LoadCursorA
GetClassInfoExA
RegisterClassExA
ClientToScreen
LockWindowUpdate
KillTimer
GetForegroundWindow
VkKeyScanExA
LoadKeyboardLayoutA
MapVirtualKeyA
SetTimer
SendMessageA
GetKeyState
IsWindow
CharLowerBuffA
PostMessageA
FindWindowExA
GetWindowThreadProcessId
GetWindowTextA
GetWindowRect
GetClassNameA
SendInput
UnregisterClassA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
Exports
Exports
Sections
.text Size: 232KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ