Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d0b75c04dd9092a34025643bbbb81760.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.d0b75c04dd9092a34025643bbbb81760.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.d0b75c04dd9092a34025643bbbb81760.exe
-
Size
164KB
-
MD5
d0b75c04dd9092a34025643bbbb81760
-
SHA1
ea20252d5644393e5178b5431209d6217df83c5e
-
SHA256
de98fce399ed24689242cfa1be24c7c5a64614780f3ce0bb3eaae8f85bc50e3f
-
SHA512
48d544167b45e8c4eaa083c7205c3f00ff86ca4151ab687c6c6e2bca144043b91c6fb9d08de3380033e9b825e6ef4e61248cd77e1095df5785a7a8cb7bc1c8db
-
SSDEEP
3072:ETqdfukefpBRn/OcBP8qimXNTu98k/GbRKfFK59XaDtt6WSSeZmg8XvYD:ETqne/pGTGqKoGlKN8ZsjSd2gD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.d0b75c04dd9092a34025643bbbb81760.exe
Files
-
NEAS.d0b75c04dd9092a34025643bbbb81760.exe.exe windows:1 windows x86
febfa014c13c473b7c9c19ff8c3c5220
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
crypt32
CryptBinaryToStringW
kernel32
GetProcAddress
LoadLibraryA
RtlUnwind
VirtualProtect
VerifyVersionInfoW
SetLastError
GetModuleHandleA
GetLastError
GetStdHandle
MultiByteToWideChar
LoadLibraryW
FreeLibrary
LocalFree
LocalAlloc
WriteConsoleW
FormatMessageW
GetModuleHandleW
lstrcpyW
lstrcmpW
lstrcatW
lstrcmpiW
QueryPerformanceCounter
crtdll
__GetMainArgs
exit
raise
signal
user32
LoadStringW
framedyn
??1CHString@@QAE@XZ
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 7KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 144KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 493B - Virtual size: 493B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE