Static task
static1
Behavioral task
behavioral1
Sample
NEAS.1748b18dea24997022b4f1e130bc1330.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.1748b18dea24997022b4f1e130bc1330.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.1748b18dea24997022b4f1e130bc1330.exe
-
Size
217KB
-
MD5
1748b18dea24997022b4f1e130bc1330
-
SHA1
fd3b010ac844ab82d6de2bc47c390fbbc0288cc9
-
SHA256
85b18d483a87ebfefd81ff2ea8ba879ddf0cd67e4beddad4c19fa16029bd6624
-
SHA512
03a52f4ffe9eee036e74c2384e58a90d0cf5828eb181dea020f870303beaca4e073c196790aa2d85ab046e6a5fe61cf4f8ee2e44aec3208cbd9a618c03829962
-
SSDEEP
3072:ucVhNcA6GWl4VYSW+wN8QD2ZUd2O4pPskqlmdIXXPBUQovPRLJJq2UEg5+znkycm:1hNX6GWKpwfiyFMYlm4KvJq2gJyw6d4q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.1748b18dea24997022b4f1e130bc1330.exe
Files
-
NEAS.1748b18dea24997022b4f1e130bc1330.exe.exe windows:5 windows x86
42fbbf365554eabf6939317825d25786
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyExW
RegCloseKey
OpenServiceW
AdjustTokenPrivileges
ControlService
InitializeAcl
LookupPrivilegeValueW
RegOpenKeyExW
RegDeleteKeyW
InitializeSecurityDescriptor
RegQueryValueExW
SetSecurityDescriptorDacl
CloseServiceHandle
OpenProcessToken
QueryServiceStatus
RegEnumKeyW
CreateServiceW
GetTokenInformation
RegEnumKeyExW
OpenThreadToken
GetLengthSid
RegDeleteValueW
StartServiceW
RegSetValueExW
FreeSid
OpenSCManagerW
AllocateAndInitializeSid
InitiateSystemShutdownExW
EqualSid
AddAce
gdi32
LineTo
SetBkMode
MoveToEx
CreatePen
GetStockObject
SelectObject
PatBlt
CreateRoundRectRgn
DeleteObject
SetTextColor
CreateSolidBrush
kernel32
GetStdHandle
GetDriveTypeW
GetConsoleOutputCP
FileTimeToSystemTime
WaitForSingleObject
GetFileAttributesW
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
SetErrorMode
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
WideCharToMultiByte
lstrcmpiA
GetStringTypeA
InterlockedExchange
WriteFile
GetTimeZoneInformation
GetSystemTimeAsFileTime
GlobalMemoryStatusEx
HeapReAlloc
GetStringTypeW
FreeLibrary
LocalFree
FormatMessageW
ResumeThread
InitializeCriticalSection
OutputDebugStringW
FindClose
InterlockedDecrement
QueryDosDeviceW
FormatMessageA
SetFileAttributesW
GetEnvironmentVariableW
SetLastError
DeviceIoControl
TlsGetValue
WriteProcessMemory
LoadResource
GetModuleFileNameW
IsDebuggerPresent
HeapAlloc
GetModuleFileNameA
EnumSystemLocalesA
GetUserDefaultLCID
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
GetModuleHandleA
CreateThread
SetEnvironmentVariableW
MoveFileExW
GetSystemDirectoryW
SetUnhandledExceptionFilter
GetFileInformationByHandle
SetEnvironmentVariableA
TerminateProcess
WriteConsoleA
GlobalAlloc
LocalFileTimeToFileTime
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
TerminateThread
LoadLibraryW
GetVersionExW
GetExitCodeProcess
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetWindowsDirectoryW
GetFileSize
GetStartupInfoW
SetEvent
DeleteFileW
GlobalLock
GetProcessHeap
CreateFileMappingW
CompareStringW
RemoveDirectoryW
ExpandEnvironmentStringsW
FindNextFileW
CreateDirectoryW
CompareStringA
FindFirstFileW
IsValidLocale
DuplicateHandle
GetProcAddress
GetProcessAffinityMask
CreateEventW
CreateFileW
CreateEventA
GetFileType
TlsSetValue
CreateFileA
ExitProcess
LeaveCriticalSection
GetLastError
SystemTimeToFileTime
LCMapStringW
GetShortPathNameW
UnmapViewOfFile
GetSystemInfo
GlobalFree
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
GlobalUnlock
VirtualFree
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
GetCPInfo
HeapSize
GetCurrentThread
RaiseException
MapViewOfFile
TlsFree
SetFilePointer
ReadFile
CloseHandle
GetACP
GetModuleHandleW
FreeResource
IsValidCodePage
HeapCreate
FindResourceW
CreateProcessW
Sleep
VirtualAlloc
GetOEMCP
shell32
SHGetSpecialFolderPathW
SHCreateDirectoryExW
ShellExecuteW
ShellExecuteExW
CommandLineToArgvW
user32
SetWindowRgn
BeginPaint
DefWindowProcW
KillTimer
GetMessageW
PostQuitMessage
GetSystemMetrics
MessageBoxW
EndPaint
MoveWindow
TranslateMessage
PostMessageW
DispatchMessageW
SendMessageW
UnregisterClassW
SetWindowTextW
AllowSetForegroundWindow
DrawTextW
InvalidateRect
SetTimer
GetClientRect
LoadCursorW
LoadIconW
CreateWindowExW
RegisterClassExW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 200B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 163KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ