Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f8ef69afa9800154663b95fc6ac104c0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.f8ef69afa9800154663b95fc6ac104c0.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.f8ef69afa9800154663b95fc6ac104c0.exe
-
Size
4.2MB
-
MD5
f8ef69afa9800154663b95fc6ac104c0
-
SHA1
81d5686d28a482f73ef38e26d636ea79de69eea8
-
SHA256
f171bcabd177e6e07e79df19b38744441b52322c27e20952cfe3dac5cf4b547a
-
SHA512
3ce559e80d865effc2ffca4522ce81d3b87ce896836d25f8023bbfaa273aa0dbda962d9198eea51d17a7fa01b8e336c895d3ad07934e192d56addd8eb6bf69bc
-
SSDEEP
98304:RQ6l2981ZyBIjN9BSiy/+eykXPqwZ/wpSTVVyLDy69/vM29v5:i426sIZ9U/+/wZIpSTyPyAXv5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.f8ef69afa9800154663b95fc6ac104c0.exe
Files
-
NEAS.f8ef69afa9800154663b95fc6ac104c0.exe.exe windows:4 windows x86
9c9710de8984c7b94a3e288f0fd52259
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetErrorMode
RtlUnwind
GetStartupInfoA
GetCommandLineA
ExitProcess
SetEnvironmentVariableA
SetCurrentDirectoryA
RaiseException
TerminateProcess
HeapFree
HeapAlloc
SetStdHandle
GetFileType
HeapReAlloc
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetACP
HeapSize
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetOEMCP
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
CompareStringA
CompareStringW
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
GetCPInfo
FindResourceExA
GetProcessVersion
InterlockedExchange
GetProfileStringA
WritePrivateProfileStringA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
FindNextFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileTime
GetFileSize
GetFullPathNameA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
lstrcpynA
GetLastError
FormatMessageA
LocalFree
WideCharToMultiByte
InterlockedIncrement
GlobalUnlock
MulDiv
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
GetModuleHandleA
InterlockedDecrement
SetLastError
FreeLibrary
GlobalFree
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrlenA
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
CloseHandle
GetDriveTypeA
FindResourceA
LoadResource
SizeofResource
LockResource
MultiByteToWideChar
GetCurrentDirectoryA
GetEnvironmentVariableA
LoadLibraryA
GetProcAddress
GetVolumeInformationA
CreateDirectoryA
GetFileAttributesA
SetFileAttributesA
DeleteFileA
GetDiskFreeSpaceExA
FreeEnvironmentStringsW
user32
CheckDlgButton
SetDlgItemTextA
IsDlgButtonChecked
IsDialogMessageA
SetWindowTextA
MoveWindow
ClientToScreen
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
GrayStringA
OemToCharA
LoadStringA
CreateDialogIndirectParamA
EndDialog
CharUpperA
LoadCursorA
GetClassNameA
PtInRect
GetSysColorBrush
DestroyMenu
InflateRect
CopyRect
GetTopWindow
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
CreateWindowExA
GetClassLongA
SetPropA
UpdateWindow
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
UnhookWindowsHookEx
MapDialogRect
SetWindowPos
ShowWindow
GetCapture
SetActiveWindow
GetAsyncKeyState
SetFocus
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
GetLastActivePopup
IsWindowEnabled
LoadImageA
LoadIconA
SendMessageA
UnregisterClassA
HideCaret
ShowCaret
GetWindowLongA
MessageBoxA
SetCursor
PostQuitMessage
RedrawWindow
MessageBeep
PeekMessageA
DispatchMessageA
TranslateMessage
PostMessageA
DrawTextA
InvalidateRect
GetParent
GetWindowRect
IsRectEmpty
SetRectEmpty
EnableWindow
GetSysColor
FillRect
IsIconic
GetSystemMetrics
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
CharNextA
IsWindowUnicode
DrawIcon
GetClientRect
SendDlgItemMessageA
MapWindowPoints
IsWindow
AdjustWindowRectEx
GetPropA
ScreenToClient
DestroyWindow
gdi32
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
DeleteObject
SetViewportExtEx
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
PatBlt
EnumFontFamiliesExA
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetBkMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetObjectA
CreateDIBitmap
GetTextExtentPointA
BitBlt
CreateCompatibleDC
CreateFontIndirectA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
comctl32
CreatePropertySheetPageA
ord17
PropertySheetA
DestroyPropertySheetPage
wsock32
WSAAsyncSelect
socket
recvfrom
sendto
connect
htons
bind
ioctlsocket
send
WSAGetLastError
WSASetLastError
WSAStartup
WSACleanup
inet_ntoa
recv
gethostbyname
closesocket
accept
htonl
shlwapi
PathIsDirectoryA
PathIsRelativeA
PathRemoveFileSpecA
PathCombineA
PathFileExistsA
Sections
.text Size: 184KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ