Static task
static1
Behavioral task
behavioral1
Sample
NEAS.4e83217da4e55b132b6b9d54a1fceb40.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.4e83217da4e55b132b6b9d54a1fceb40.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.4e83217da4e55b132b6b9d54a1fceb40.exe
-
Size
163KB
-
MD5
4e83217da4e55b132b6b9d54a1fceb40
-
SHA1
b9082fa30af59eed620c6061810c3f5c7c3b2dc2
-
SHA256
98669367386151848e20202c8742251ab429ced2497df15c98b205e4bd31db05
-
SHA512
187099cda9936cd79c79eaaf5d3865c8d1bfd0603857932133f445edad095febe828786ada161733610c972174374597254775e7c8bfc71c2eeb98830c2b891a
-
SSDEEP
3072:ETqdfukefpBRn/OcBP8qimXNTu98k/GbRKfFK59XaDtt6WSSeZmg8XvYL:ETqne/pGTGqKoGlKN8ZsjSd2gL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.4e83217da4e55b132b6b9d54a1fceb40.exe
Files
-
NEAS.4e83217da4e55b132b6b9d54a1fceb40.exe.exe windows:1 windows x86
febfa014c13c473b7c9c19ff8c3c5220
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
crypt32
CryptBinaryToStringW
kernel32
GetProcAddress
LoadLibraryA
RtlUnwind
VirtualProtect
VerifyVersionInfoW
SetLastError
GetModuleHandleA
GetLastError
GetStdHandle
MultiByteToWideChar
LoadLibraryW
FreeLibrary
LocalFree
LocalAlloc
WriteConsoleW
FormatMessageW
GetModuleHandleW
lstrcpyW
lstrcmpW
lstrcatW
lstrcmpiW
QueryPerformanceCounter
crtdll
__GetMainArgs
exit
raise
signal
user32
LoadStringW
framedyn
??1CHString@@QAE@XZ
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 7KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 144KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 493B - Virtual size: 493B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE