Static task
static1
Behavioral task
behavioral1
Sample
NEAS.77cdc8f0f3bdface7191d8a9c45c3ce0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.77cdc8f0f3bdface7191d8a9c45c3ce0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.77cdc8f0f3bdface7191d8a9c45c3ce0.exe
-
Size
202KB
-
MD5
77cdc8f0f3bdface7191d8a9c45c3ce0
-
SHA1
48e53b42543477f3cad01cb7b8f5f19bd31f9f72
-
SHA256
8f3676221f008c33e6c51a0f137c28a483fcc2044e9f304d74a93a35db207292
-
SHA512
2d9b1cfed245bccd6d9321cb6b7c6047c60625e2d747ba406e3c7274e9aeb7bc3bbbdecc8b190820bfdcb6c179b68a825acb6f9a8fab6ff568d218b85be43a58
-
SSDEEP
6144:oBdMOv5SuYP/CcNmRmCG9aSebFjhQmarNPemxY:oJ5+dNSmTaplQxBxY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.77cdc8f0f3bdface7191d8a9c45c3ce0.exe
Files
-
NEAS.77cdc8f0f3bdface7191d8a9c45c3ce0.exe.exe windows:4 windows x86
6ebead13f52b934afadd6ada0a580006
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentDirectoryW
CreateEventA
GetFullPathNameA
GetFileSize
ConnectNamedPipe
ExpandEnvironmentStringsW
GetStartupInfoW
lstrcpynA
GetLocalTime
GetFileAttributesA
AddAtomA
GetEnvironmentStringsW
GetCurrentProcessId
FileTimeToSystemTime
lstrcpyn
GetFileTime
ReplaceFileW
GetCurrentThreadId
SetComputerNameW
lstrcmpi
ExitProcess
SuspendThread
CreateDirectoryW
CreateMutexW
ReadDirectoryChangesW
CreateFileA
GetLogicalDriveStringsW
lstrcmpiW
FindAtomW
Sleep
CreateThread
EndUpdateResourceW
CopyFileExW
EndUpdateResourceA
QueryPerformanceFrequency
GetOEMCP
GetModuleHandleA
GetTempPathW
lstrcmpW
GetProcAddress
lstrlenW
LoadResource
user32
BringWindowToTop
ActivateKeyboardLayout
ShowWindow
RegisterWindowMessageW
CharLowerA
TrackPopupMenu
SetWindowRgn
GetDC
CreateIcon
UnregisterClassW
MessageBeep
LoadImageW
RegisterWindowMessageA
FrameRect
LoadIconW
InsertMenuA
DefWindowProcW
GetDC
gdi32
GetTextExtentPointW
OffsetWindowOrgEx
GetDeviceCaps
GetViewportOrgEx
EnumFontsW
GetLogColorSpaceA
GetSystemPaletteEntries
RealizePalette
GetClipBox
SetDCBrushColor
FloodFill
CloseMetaFile
Escape
AngleArc
SetColorSpace
PlayEnhMetaFile
advapi32
RegSaveKeyA
RegCreateKeyW
RegQueryInfoKeyW
shell32
ExtractIconA
SHGetSpecialFolderLocation
StrRChrW
ExtractIconExA
StrRStrW
StrRChrIA
DuplicateIcon
StrNCmpIA
setupapi
CM_Get_Class_Name_ExA
InstallHinfSectionA
CM_Disable_DevNode
SetupDiSetClassInstallParamsA
SetupAddSectionToDiskSpaceListA
ws2_32
getprotobynumber
recv
winmm
midiInReset
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.KsT Size: 1024B - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.JsaqF Size: 512B - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CflZ Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.XGYQ Size: 1KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.igrtL Size: 1KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.RhnrqI Size: 1KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kYI Size: 1024B - Virtual size: 232KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ