Static task
static1
Behavioral task
behavioral1
Sample
NEAS.7824e1e9b1a58fca26883aa68c63f580.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.7824e1e9b1a58fca26883aa68c63f580.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.7824e1e9b1a58fca26883aa68c63f580.exe
-
Size
204KB
-
MD5
7824e1e9b1a58fca26883aa68c63f580
-
SHA1
4cd7e3f66f5e835305e21797ed59ae4138b10fbc
-
SHA256
684a6d75115b758817a5501888ec45ff21a6ee15476efc8a972fb60b9af49047
-
SHA512
89d4c45abc3b7bba57bb14c688b8a98bc3c37952fe9f66e9bc515a0544a644c64f6ad353d0e8276d1edd244856d39c149010baca67d46280beffa49509f2f3d9
-
SSDEEP
3072:n5u7yT4TVbkuRaX1w71jnRkCoyJTarYWbV+HOFxg+z1WxJsqWkoyjOowUVl/TlAQ:nLexkuRaX41xoyJV65gzyZko+uc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.7824e1e9b1a58fca26883aa68c63f580.exe
Files
-
NEAS.7824e1e9b1a58fca26883aa68c63f580.exe.exe windows:4 windows x86
add9e90fe8cc1a6d600a60e22be53bf7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExW
lstrcat
CompareFileTime
SetEvent
GetTempPathA
CopyFileExA
GlobalDeleteAtom
CopyFileA
LocalFree
CopyFileExW
ExitProcess
ExpandEnvironmentStringsA
LoadLibraryA
GetLogicalDriveStringsW
GetCommandLineA
IsValidLocale
SetPriorityClass
GetThreadPriority
GetWindowsDirectoryW
GetTempFileNameA
GetDateFormatA
SetThreadPriority
EnumCalendarInfoW
GetNumberFormatW
MultiByteToWideChar
OpenMutexW
GetFileAttributesW
GetSystemDefaultLCID
ExpandEnvironmentStringsW
GetProcAddress
GetLogicalDriveStringsA
lstrcpynW
GetLogicalDrives
GetCurrentDirectoryA
IsBadReadPtr
GetStringTypeA
user32
SetFocus
RegisterClassExW
SetTimer
CharLowerA
ShowWindow
MessageBoxW
CopyImage
LoadImageA
GetClassLongA
RegisterClassExA
PostMessageW
SetParent
GetDlgItemTextA
DefWindowProcA
GetClientRect
SendMessageW
DefFrameProcA
EnumDesktopsA
SetForegroundWindow
InvalidateRect
CheckDlgButton
LoadMenuIndirectA
GetWindowTextLengthA
SetWindowTextW
GetDC
LoadBitmapA
SendDlgItemMessageA
DefWindowProcW
SetDlgItemTextA
SendDlgItemMessageW
ChildWindowFromPoint
DestroyIcon
ArrangeIconicWindows
DrawTextA
CreateDialogIndirectParamA
DefDlgProcW
CharUpperA
CharPrevW
GetScrollPos
UpdateLayeredWindow
CallWindowProcA
GetDC
SetWindowRgn
gdi32
CreateRoundRectRgn
ResetDCW
Arc
CreatePen
CreateColorSpaceW
GetTextExtentPointA
GetPath
OffsetClipRgn
RectInRegion
advapi32
RegRestoreKeyW
RegDeleteKeyA
RegSaveKeyA
RegReplaceKeyW
RegReplaceKeyA
RegOpenKeyExA
RegFlushKey
shell32
SHCreateDirectoryExW
ShellExecuteExW
ExtractAssociatedIconExW
DuplicateIcon
SHGetDataFromIDListA
StrChrA
SHGetFileInfoA
StrChrIW
ExtractAssociatedIconA
shlwapi
UrlCombineA
PathMakeSystemFolderA
UrlUnescapeW
SHRegSetUSValueA
SHCreateThread
PathAppendA
PathCombineW
PathIsLFNFileSpecA
PathSetDlgItemPathW
StrToInt64ExA
SHCreateStreamOnFileW
StrCSpnIW
ColorRGBToHLS
SHRegGetBoolUSValueW
oleaut32
VarUI4FromUI1
VarIdiv
VarCyFromUI1
VarDateFromUI2
VarI8FromI2
VarR4CmpR8
VarNumFromParseNum
opengl32
glGetTexImage
glRectsv
crypt32
CryptSIPPutSignedDataMsg
CryptEnumKeyIdentifierProperties
Sections
.pGCC Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.XJy Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.TvKn Size: 3KB - Virtual size: 472KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CA Size: 4KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 117KB - Virtual size: 327KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ylLMGt Size: 512B - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Z Size: 1KB - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 758B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ