Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0ff1d39f81d7771b9422ee9bf63bb440.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.0ff1d39f81d7771b9422ee9bf63bb440.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.0ff1d39f81d7771b9422ee9bf63bb440.exe
-
Size
394KB
-
MD5
0ff1d39f81d7771b9422ee9bf63bb440
-
SHA1
2e441d5469a60ba71b49befa12cb195509a66247
-
SHA256
b47e494fd14c144b9bb1fa35846e585743b4d02ad12bdc52e954a9edba1a2210
-
SHA512
be78a25494ce5cd3e050446bb3b41c060757d42245c39b7f99172bc5d05b6dff39074a1f379e60074bcff3761456abcf91a484bccb2728bb41ea3bb70ba9d4c1
-
SSDEEP
6144:rKBmpYWiLrDMvJfgM+HWMLwNgP/5EA8PSjC9bDmPUArASk+81Fwd:rvfgTHWMmgP/hHjmwUJ1ud
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.0ff1d39f81d7771b9422ee9bf63bb440.exe
Files
-
NEAS.0ff1d39f81d7771b9422ee9bf63bb440.exe.exe windows:5 windows x86
8886f25cba86002657c47aee8a1b1784
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
CompareStringW
GetModuleHandleA
GetVersionExA
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
GetCurrentThreadId
GlobalFlags
GlobalHandle
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
HeapAlloc
HeapFree
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
Sleep
ExitProcess
GetTimeZoneInformation
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
VirtualAlloc
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
lstrlenA
GetCurrentProcessId
GetFileTime
GetFileSizeEx
FileTimeToLocalFileTime
FileTimeToSystemTime
FreeLibrary
InterlockedDecrement
GetModuleHandleW
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
GetProcAddress
GetModuleFileNameW
GetFullPathNameW
GetVolumeInformationW
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
LoadLibraryW
SetLastError
WideCharToMultiByte
LocalAlloc
FindClose
lstrlenW
lstrcmpW
GetFileAttributesW
FindFirstFileW
lstrcmpA
CloseHandle
CreateFileW
CopyFileW
GetPrivateProfileStringW
MultiByteToWideChar
OpenProcess
WaitForSingleObject
SetFileAttributesW
LocalFree
DeleteFileW
LockResource
MoveFileW
GetLastError
GetTempPathW
FormatMessageW
SizeofResource
LoadResource
CompareStringA
FindResourceW
user32
SetWindowTextW
ValidateRect
RegisterWindowMessageW
LoadIconW
WinHelpW
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetFocus
IsWindow
DispatchMessageW
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetMenu
GetClientRect
PostMessageW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
CopyRect
PtInRect
GetMenu
SetWindowLongW
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
ClientToScreen
GrayStringW
DrawTextExW
MessageBoxW
GetForegroundWindow
DrawTextW
TabbedTextOutW
LoadCursorW
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
PostQuitMessage
DestroyMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
GetDlgItem
GetSystemMetrics
CharUpperW
GetSubMenu
GetMenuItemCount
GetWindowTextW
GetWindowThreadProcessId
SendMessageW
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
UnhookWindowsHookEx
GetMenuState
GetMenuItemID
SetForegroundWindow
advapi32
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
shell32
ShellExecuteW
SHGetFolderPathW
shlwapi
PathIsUNCW
PathFindFileNameW
PathStripToRootW
crypt32
CertCloseStore
CertFindCertificateInStore
CertFreeCertificateContext
CertGetNameStringW
CryptQueryObject
CryptDecodeObject
CryptMsgClose
CryptMsgGetParam
wintrust
WinVerifyTrust
oleacc
LresultFromObject
CreateStdAccessibleObject
psapi
EnumProcessModules
EnumProcesses
GetModuleBaseNameW
GetModuleFileNameExW
gdi32
RestoreDC
SetBkColor
SetTextColor
SaveDC
SetMapMode
GetClipBox
OffsetViewportOrgEx
CreateBitmap
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
GetDeviceCaps
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
DeleteObject
SetViewportExtEx
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
comdlg32
GetFileTitleW
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 186KB - Virtual size: 185KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 105KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE