Static task
static1
Behavioral task
behavioral1
Sample
NEAS.ed0aa3c1f4946ee57d66220cfafb36f0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.ed0aa3c1f4946ee57d66220cfafb36f0.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.ed0aa3c1f4946ee57d66220cfafb36f0.exe
-
Size
204KB
-
MD5
ed0aa3c1f4946ee57d66220cfafb36f0
-
SHA1
d358435b762bce18803e52f036ef6d83514780ab
-
SHA256
a1b9bd8518e3bed73ac9aa187ab3b9f5610e4afd7613dcb19d04e59f232dec4e
-
SHA512
c49788c9e5ac1a85c962e26d01f1ad715846fe6a71a021dd262d474bc630110cf00c34a832f989982eee1e2eb32a7f80b23c76cee23e34583d46a6b41756e926
-
SSDEEP
3072:35u7yT4TVbkuRaX1w71jnRkCoyJTarYWbV+HOFxg+z1WxJsqWkoyjOowUVl/TlAQ:3LexkuRaX41xoyJV65gzyZko+uc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.ed0aa3c1f4946ee57d66220cfafb36f0.exe
Files
-
NEAS.ed0aa3c1f4946ee57d66220cfafb36f0.exe.exe windows:4 windows x86
add9e90fe8cc1a6d600a60e22be53bf7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExW
lstrcat
CompareFileTime
SetEvent
GetTempPathA
CopyFileExA
GlobalDeleteAtom
CopyFileA
LocalFree
CopyFileExW
ExitProcess
ExpandEnvironmentStringsA
LoadLibraryA
GetLogicalDriveStringsW
GetCommandLineA
IsValidLocale
SetPriorityClass
GetThreadPriority
GetWindowsDirectoryW
GetTempFileNameA
GetDateFormatA
SetThreadPriority
EnumCalendarInfoW
GetNumberFormatW
MultiByteToWideChar
OpenMutexW
GetFileAttributesW
GetSystemDefaultLCID
ExpandEnvironmentStringsW
GetProcAddress
GetLogicalDriveStringsA
lstrcpynW
GetLogicalDrives
GetCurrentDirectoryA
IsBadReadPtr
GetStringTypeA
user32
SetFocus
RegisterClassExW
SetTimer
CharLowerA
ShowWindow
MessageBoxW
CopyImage
LoadImageA
GetClassLongA
RegisterClassExA
PostMessageW
SetParent
GetDlgItemTextA
DefWindowProcA
GetClientRect
SendMessageW
DefFrameProcA
EnumDesktopsA
SetForegroundWindow
InvalidateRect
CheckDlgButton
LoadMenuIndirectA
GetWindowTextLengthA
SetWindowTextW
GetDC
LoadBitmapA
SendDlgItemMessageA
DefWindowProcW
SetDlgItemTextA
SendDlgItemMessageW
ChildWindowFromPoint
DestroyIcon
ArrangeIconicWindows
DrawTextA
CreateDialogIndirectParamA
DefDlgProcW
CharUpperA
CharPrevW
GetScrollPos
UpdateLayeredWindow
CallWindowProcA
GetDC
SetWindowRgn
gdi32
CreateRoundRectRgn
ResetDCW
Arc
CreatePen
CreateColorSpaceW
GetTextExtentPointA
GetPath
OffsetClipRgn
RectInRegion
advapi32
RegRestoreKeyW
RegDeleteKeyA
RegSaveKeyA
RegReplaceKeyW
RegReplaceKeyA
RegOpenKeyExA
RegFlushKey
shell32
SHCreateDirectoryExW
ShellExecuteExW
ExtractAssociatedIconExW
DuplicateIcon
SHGetDataFromIDListA
StrChrA
SHGetFileInfoA
StrChrIW
ExtractAssociatedIconA
shlwapi
UrlCombineA
PathMakeSystemFolderA
UrlUnescapeW
SHRegSetUSValueA
SHCreateThread
PathAppendA
PathCombineW
PathIsLFNFileSpecA
PathSetDlgItemPathW
StrToInt64ExA
SHCreateStreamOnFileW
StrCSpnIW
ColorRGBToHLS
SHRegGetBoolUSValueW
oleaut32
VarUI4FromUI1
VarIdiv
VarCyFromUI1
VarDateFromUI2
VarI8FromI2
VarR4CmpR8
VarNumFromParseNum
opengl32
glGetTexImage
glRectsv
crypt32
CryptSIPPutSignedDataMsg
CryptEnumKeyIdentifierProperties
Sections
.pGCC Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.XJy Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.TvKn Size: 3KB - Virtual size: 472KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CA Size: 4KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 117KB - Virtual size: 327KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ylLMGt Size: 512B - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Z Size: 1KB - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 758B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ