Static task
static1
Behavioral task
behavioral1
Sample
NEAS.1d0e30146cb978c37db994cca438bcc0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.1d0e30146cb978c37db994cca438bcc0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.1d0e30146cb978c37db994cca438bcc0.exe
-
Size
705KB
-
MD5
1d0e30146cb978c37db994cca438bcc0
-
SHA1
d14d933a3cafd5a64a256142a23d97a530abd3e2
-
SHA256
b386d59961de6bb5fcbaa4fb5c4d259289482af1d9087b5664ebc923f64544f2
-
SHA512
90dc0046de150a03d84d7084d5d62d8fc481c99bc938d92127879581e4ddfb2003373e3121d9075938f996f0605ad60291d76dc814b16f06cadf2bea49298ff3
-
SSDEEP
12288:rLHZCmbTgLtqOMg5OjSX3CVlqNYuAX8DeBJT18Xzo3GpzO+xZRzbfnXAFSZHSow+:rdvTgLtt5SSiVw6uAX8DS52tpz9ZRzbH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.1d0e30146cb978c37db994cca438bcc0.exe
Files
-
NEAS.1d0e30146cb978c37db994cca438bcc0.exe.exe windows:5 windows x64
f4af25dbe3b7ae210a0a8f355540e112
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
SetLastError
GetCurrentProcess
WriteFile
OutputDebugStringA
VirtualAlloc
InitializeProcThreadAttributeList
WaitForSingleObject
ResumeThread
GetModuleHandleA
OpenProcess
GetExitCodeThread
CallNamedPipeA
GetLastError
UpdateProcThreadAttribute
CreateFileA
LoadLibraryA
GetVersionExA
CloseHandle
GetSystemInfo
CreateNamedPipeA
HeapAlloc
QueueUserAPC
VirtualProtectEx
GetThreadContext
GetProcAddress
VirtualAllocEx
GetFileSize
ReadProcessMemory
GetProcessHeap
CreateRemoteThread
CreateProcessA
FormatMessageA
VirtualFreeEx
OpenThread
ConnectNamedPipe
VirtualQueryEx
WriteConsoleW
SetFilePointerEx
ReadConsoleW
SetEndOfFile
WriteProcessMemory
GetFileSizeEx
DeleteProcThreadAttributeList
ReadFile
HeapReAlloc
HeapSize
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
RaiseException
GetCommandLineA
GetCommandLineW
GetStdHandle
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetACP
HeapFree
GetStringTypeW
GetFileType
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
SetStdHandle
CreateFileW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
user32
GetShellWindow
GetWindowThreadProcessId
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
shlwapi
PathRemoveFileSpecA
Sections
.text Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE