DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.c01c5d4e8a7965704026f69e617faaf0.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.c01c5d4e8a7965704026f69e617faaf0.dll
Resource
win10v2004-20231023-en
Target
NEAS.c01c5d4e8a7965704026f69e617faaf0.exe
Size
472KB
MD5
c01c5d4e8a7965704026f69e617faaf0
SHA1
4efac6e92929acce09cac934b0cc05a480c4144f
SHA256
810895d237328317bd997fed654d4c4fbef51a9b38276232f874335e0008604d
SHA512
b0f2465d0ef55edccc60c060616ab37f36d4d8e528d76a117ddf8a7a85f246976eddeb086fba6548a21a0be88449db524b0c30ed54d95c4363770dece8959e0c
SSDEEP
6144:noCSiSae1+ccl8if9iTP3Xuomp9lXSLQ9cM384xLLM9FpZfihpc7ESwbMf:oyOxcl3f9iTf1gto94WFpp7xu
Checks for missing Authenticode signature.
resource |
---|
NEAS.c01c5d4e8a7965704026f69e617faaf0.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord176
ord118
ord101
ord136
ord108
ord179
ord172
ord159
ord145
ord1
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExW
RegOpenKeyExA
RegCloseKey
LCMapStringW
HeapReAlloc
OutputDebugStringW
SetStdHandle
WriteConsoleW
FlushFileBuffers
DisableThreadLibraryCalls
IsValidCodePage
GetACP
FreeLibrary
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetLocaleInfoW
GetUserDefaultLCID
GetLocaleInfoA
GetDateFormatA
GetTimeFormatA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
FileTimeToLocalFileTime
FindClose
ReadFile
SetFilePointer
WriteFile
CloseHandle
GetLastError
FileTimeToDosDateTime
GetCurrentProcessId
lstrlenA
SetCurrentDirectoryA
SetCurrentDirectoryW
GetCurrentDirectoryA
GetCurrentDirectoryW
CreateDirectoryA
CreateDirectoryW
CreateFileA
CreateFileW
DeleteFileA
DeleteFileW
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
GetDriveTypeW
GetFileAttributesA
GetFileAttributesW
GetFullPathNameA
GetFullPathNameW
RemoveDirectoryA
RemoveDirectoryW
GetTempPathW
SetLastError
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleW
LoadLibraryExA
LoadLibraryExW
GetTempPathA
IsDebuggerPresent
IsProcessorFeaturePresent
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetStringTypeW
HeapFree
HeapAlloc
GetCommandLineA
GetCurrentThreadId
GetOEMCP
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
ExitProcess
GetModuleHandleExW
HeapSize
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
EnterCriticalSection
LeaveCriticalSection
GetConsoleCP
GetConsoleMode
SetFilePointerEx
OleInitialize
OleUninitialize
StgCreateDocfile
StgOpenStorage
SysStringLen
VariantChangeType
GetActiveObject
SysAllocStringLen
VarI2FromStr
VarCyFromR8
VarR8FromCy
VariantClear
VariantInit
SafeArrayPutElement
SafeArrayGetElement
VarDecFromR8
VarBstrFromR8
VarR8FromDec
VarR8FromStr
SysAllocString
SysFreeString
SafeArrayCreate
SafeArrayDestroy
CharUpperA
GetClassNameW
EnumWindows
SendMessageW
CharUpperW
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ