Static task
static1
Behavioral task
behavioral1
Sample
NEAS.b6b9b33249b19ae780f08596ab3ee0f0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.b6b9b33249b19ae780f08596ab3ee0f0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.b6b9b33249b19ae780f08596ab3ee0f0.exe
-
Size
735KB
-
MD5
b6b9b33249b19ae780f08596ab3ee0f0
-
SHA1
cf59ba05b30a210013129195e51df7f45ed41653
-
SHA256
32e3377f3946b69b640713f854b880f87538d7896fb9b7f2823c8c7675243282
-
SHA512
38cbb948bc0578288aa8715f5fe3c5eefb50fc7b3190c34845c704a37db68d382dcfb1761e1363f2205291747f6881bb0b3b6b63d5406c422d51ca71b07621f1
-
SSDEEP
6144:G72bpS87Oy3FAcAa8t3MODda4SFtLWVkHS1lxSWkZcLRidaZaBbNHuSsb:Gqg8F3KvZMOY9cMzZkRD3Ssb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.b6b9b33249b19ae780f08596ab3ee0f0.exe
Files
-
NEAS.b6b9b33249b19ae780f08596ab3ee0f0.exe.exe windows:4 windows x86
dc2ab6458f82890e56d12e2b5db8f15d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
pbvm60
ord137
kernel32
GetCPInfo
WideCharToMultiByte
GetCommandLineA
GetModuleHandleA
GetStartupInfoA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
LoadLibraryA
GetACP
GetOEMCP
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
WriteFile
HeapFree
HeapAlloc
VirtualAlloc
GetProcAddress
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 823B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 870B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ