Static task
static1
Behavioral task
behavioral1
Sample
NEAS.86d5475921e4606695541d66512f2da0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.86d5475921e4606695541d66512f2da0.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.86d5475921e4606695541d66512f2da0.exe
-
Size
127KB
-
MD5
86d5475921e4606695541d66512f2da0
-
SHA1
21a2d2ec6ae2ab211639acf66acdac8f1318e8b9
-
SHA256
8939c689501cd544239aaa2dcd4e2e25f947260f8cf56581453735348ca16e1b
-
SHA512
0a64ce7fc6fbde91875480d92d7668c1760d50606f399be1a7c9c8d894b2e9fd657d9d2d46fa3657d4168d72b9b23af4a2209c6c3a1086875e505c2c4746a1eb
-
SSDEEP
3072:7wvKdJ3QQpMIPf4b1v4bESA2CNkxRDS024bBhFy:cvrQObb1gbESA2CNkxRDS0zbB+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.86d5475921e4606695541d66512f2da0.exe
Files
-
NEAS.86d5475921e4606695541d66512f2da0.exe.exe windows:5 windows x86
3ddbbee375c8d31782982e10a32491d8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winhttp
WinHttpCloseHandle
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpOpenRequest
WinHttpConnect
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetProxyForUrl
WinHttpCrackUrl
WinHttpQueryHeaders
WinHttpOpen
WinHttpSetOption
WinHttpReadData
shlwapi
PathAddBackslashW
StrToIntW
StrStrIW
StrCpyW
StrStrIA
StrChrIW
StrToIntExA
StrCatW
comctl32
InitCommonControlsEx
urlmon
URLDownloadToCacheFileW
kernel32
GetModuleHandleA
GetStartupInfoA
LocalFree
GetCommandLineW
WideCharToMultiByte
Sleep
HeapFree
RemoveDirectoryW
CreateDirectoryW
GetTempFileNameW
GetCommandLineA
UnmapViewOfFile
GetTempPathW
GetProcessHeap
lstrcatA
lstrlenA
lstrcmpiA
MultiByteToWideChar
lstrcmpiW
lstrcpyW
lstrcatW
lstrcpyA
GetFileSize
SetFilePointer
ReadFile
CreateFileW
CloseHandle
GetModuleFileNameW
GetVersionExW
IsWow64Process
GetCurrentProcess
GetTickCount
GetLastError
LoadLibraryExW
FreeLibrary
CreateProcessW
lstrlenW
EnterCriticalSection
DeleteFileW
LeaveCriticalSection
CreateEventW
WaitForMultipleObjects
GetCurrentProcessId
GetEnvironmentStringsW
CreateFileMappingW
MapViewOfFile
ResumeThread
lstrcpynW
LoadLibraryW
ExitProcess
InitializeCriticalSectionAndSpinCount
GetModuleHandleW
CreateThread
WriteFile
FlushFileBuffers
GlobalFree
HeapAlloc
user32
GetWindowLongW
LoadIconW
wsprintfW
GetDlgItem
SetWindowTextW
GetDlgItemTextW
SetDlgItemTextW
CheckDlgButton
SetTimer
ShowWindow
SetWindowLongW
AppendMenuW
GetCursorPos
TrackPopupMenuEx
DestroyMenu
DialogBoxParamW
SendMessageW
CreatePopupMenu
gdi32
GetStockObject
GetObjectW
CreateFontIndirectW
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorA
shell32
CommandLineToArgvW
Shell_NotifyIconW
ShellExecuteW
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 7.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ