NvOptimusEnablement
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.b09cdfe9c7b75084a241e7f1b2a27d80.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.b09cdfe9c7b75084a241e7f1b2a27d80.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.b09cdfe9c7b75084a241e7f1b2a27d80.exe
-
Size
1.1MB
-
MD5
b09cdfe9c7b75084a241e7f1b2a27d80
-
SHA1
452d9373292027a62eeb89a3c24cba6af142ab02
-
SHA256
552b100d93fd72d35ba6da7e0f8aef80ccaf3b17fe0b6efe3bb2184932759537
-
SHA512
83724243b803eda809a4d9c71be8aded352a943f6784af519b68a6b801b2989fade38d7f6eb52ac7a52784bf3fa5aaaa69b80df8412681fd34d570bd34f7da3e
-
SSDEEP
24576:wImLkpV9riAvpqrJ0M+t2merBm/1GkMjmoE0ZI+7u+zN+Rqv7:RS/yt2merBm/1IB/7pzN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.b09cdfe9c7b75084a241e7f1b2a27d80.exe
Files
-
NEAS.b09cdfe9c7b75084a241e7f1b2a27d80.exe.exe windows:6 windows x86
46763bedb6d6357aa56d5a15bd990bf0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathIsRelativeW
kernel32
VerSetConditionMask
ExpandEnvironmentStringsW
CreateFileW
GetFileAttributesW
GetFullPathNameW
OutputDebugStringW
SetLastError
CreateProcessA
CreateProcessW
GetSystemDirectoryW
FreeLibrary
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
LoadLibraryExW
lstrcmpA
lstrcmpW
VerifyVersionInfoW
FileTimeToSystemTime
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
OutputDebugStringA
Sleep
GetCurrentThreadId
ProcessIdToSessionId
GetSystemTime
GetSystemTimeAsFileTime
CreateTimerQueueTimer
DeleteTimerQueueTimer
GetModuleHandleExW
MoveFileW
MultiByteToWideChar
WideCharToMultiByte
CreateToolhelp32Snapshot
RemoveVectoredContinueHandler
Process32NextW
CreateDirectoryW
FindCloseChangeNotification
FindFirstChangeNotificationW
FindNextChangeNotification
GetCurrentDirectoryW
GetErrorMode
SetErrorMode
GetCommandLineW
RaiseException
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
RemoveDirectoryW
DeviceIoControl
HeapSize
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
GetStringTypeW
GetFileSizeEx
ReadConsoleW
ReadFile
SetStdHandle
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
SetConsoleCtrlHandler
GetCurrentThread
EnumSystemLocalesW
AddVectoredContinueHandler
RemoveVectoredExceptionHandler
DecodePointer
AddVectoredExceptionHandler
SetUnhandledExceptionFilter
RtlCaptureStackBackTrace
GetModuleHandleW
WaitForMultipleObjects
OpenEventW
LocalFree
LocalAlloc
OpenProcess
CreateThread
GetCurrentProcessId
CreateEventW
WaitForSingleObject
SetEvent
GetLastError
CloseHandle
GetCurrentProcess
GetProcessTimes
SetDefaultDllDirectories
HeapReAlloc
Process32FirstW
FormatMessageA
SetCurrentDirectoryW
FindFirstFileExW
GetDiskFreeSpaceExW
GetFileAttributesExW
GetFileInformationByHandle
GetFinalPathNameByHandleW
SetEndOfFile
SetFileAttributesW
SetFileInformationByHandle
SetFilePointerEx
SetFileTime
GetTempPathW
AreFileApisANSI
CreateDirectoryExW
CopyFileW
MoveFileExW
CreateHardLinkW
GetFileInformationByHandleEx
CreateSymbolicLinkW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitProcess
GetFileType
GetStdHandle
WriteConsoleW
GetCPInfo
WriteFile
HeapAlloc
HeapFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
user32
PeekMessageW
GetMessageW
ShutdownBlockReasonDestroy
ShutdownBlockReasonCreate
SetWindowLongW
GetWindowLongW
LoadStringW
UnregisterClassW
RegisterClassW
DefWindowProcW
PostMessageW
DispatchMessageW
TranslateMessage
DestroyWindow
PostThreadMessageW
CreateWindowExW
shell32
CommandLineToArgvW
advapi32
LookupAccountSidW
RegSetKeyValueW
RegOpenKeyExW
GetUserNameW
BuildExplicitAccessWithNameW
SetSecurityInfo
GetSecurityInfo
SetEntriesInAclW
StartServiceCtrlDispatcherW
SetServiceStatus
RegisterServiceCtrlHandlerExW
QueryServiceConfigW
OpenServiceW
OpenSCManagerW
CloseServiceHandle
ChangeServiceConfigW
RegGetValueW
RegSetValueExW
RegDeleteValueW
RegCreateKeyExW
RegCloseKey
CreateWellKnownSid
OpenProcessToken
Exports
Exports
Sections
.text Size: 527KB - Virtual size: 527KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 134KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 416KB - Virtual size: 1008KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ