Static task
static1
Behavioral task
behavioral1
Sample
NEAS.e433c133fdda6fcad08d3fa0886cf1d0.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.e433c133fdda6fcad08d3fa0886cf1d0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.e433c133fdda6fcad08d3fa0886cf1d0.exe
-
Size
236KB
-
MD5
e433c133fdda6fcad08d3fa0886cf1d0
-
SHA1
4c1943ed57aec033d06a38bc73aa0b015c4e722c
-
SHA256
09182c621b8218e5c8ee11b51478f40abcc35d8a421654578e8a82f7ef6e113d
-
SHA512
5cda8264cd2ff37d553202fd6d6d89f34e623490d9c1c4c91e49d95bb0c4d7ac3840b2f47584c2984e09b75afc23d3b116275981980ee04f6142bea3ac281492
-
SSDEEP
3072:THpyEHspXHO8PRghWZUannPQoTXMKY4KEXoJZ6+UwQyUt:THpcXHOIRghWZ59TXMcg9Q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.e433c133fdda6fcad08d3fa0886cf1d0.exe
Files
-
NEAS.e433c133fdda6fcad08d3fa0886cf1d0.exe.exe windows:4 windows x86
b182675bdf4aa38b3fc646cccf526a32
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
GetFileAttributesA
RtlUnwind
HeapSize
GetTimeZoneInformation
GetSystemTime
GetStartupInfoA
ExitProcess
HeapAlloc
HeapFree
CreateThread
ExitThread
RaiseException
HeapReAlloc
GetACP
HeapDestroy
HeapCreate
VirtualFree
FlushFileBuffers
IsBadWritePtr
SetStdHandle
GetFileType
SetHandleCount
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetExitCodeProcess
CreateProcessA
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetFilePointer
WriteFile
ReadFile
SetErrorMode
GetOEMCP
GetCPInfo
WritePrivateProfileStringA
GlobalFlags
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
GetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
lstrcpynA
SetLastError
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
SuspendThread
GetCurrentThreadId
SetThreadPriority
ResumeThread
LocalFree
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
GetCurrentProcess
FindFirstFileA
FindNextFileA
FindClose
GetLogicalDrives
GetDriveTypeA
WinExec
RemoveDirectoryA
OpenProcess
TerminateProcess
MoveFileA
CreateDirectoryA
Sleep
MulDiv
OpenMutexA
CreateMutexA
CopyFileA
SetFileAttributesA
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
WaitForSingleObject
ResetEvent
SetEvent
DeleteFileA
GetTempPathA
GetLocalTime
CreateEventA
GetComputerNameA
GetModuleFileNameA
CreateFileA
CloseHandle
VirtualAlloc
user32
PtInRect
DestroyMenu
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
ClientToScreen
ShowWindow
SetWindowTextA
IsDialogMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
CopyRect
GetClassNameA
GetTopWindow
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetDlgCtrlID
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
GetMessageTime
GetMessagePos
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
LoadStringA
EndDialog
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
UnregisterClassA
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
SetCursor
PostQuitMessage
PostMessageA
GetSysColorBrush
LoadCursorA
TranslateMessage
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
ExitWindowsEx
GetForegroundWindow
GetWindowTextA
GetSystemMenu
EnableWindow
IsIconic
GetSystemMetrics
DrawIcon
GetMessageA
DispatchMessageA
LoadIconA
RegisterClassExA
CreateWindowExA
DefWindowProcA
FindWindowA
FindWindowExA
SendMessageTimeoutA
IsWindow
SendMessageA
GetDesktopWindow
GetClientRect
GetDC
ReleaseDC
RemovePropA
gdi32
RectVisible
TextOutA
ExtTextOutA
Escape
ScaleWindowExtEx
PtVisible
DeleteDC
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
RestoreDC
SaveDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
RealizePalette
SetStretchBltMode
StretchBlt
GetDeviceCaps
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
GetDIBits
DeleteObject
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCloseKey
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
GetUserNameA
shell32
ShellExecuteA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
comctl32
ord17
ole32
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
OleLoadPictureFile
SysAllocStringLen
SysFreeString
ws2_32
getsockname
recv
ioctlsocket
accept
send
closesocket
inet_addr
htons
socket
WSAGetLastError
WSACleanup
inet_ntoa
gethostbyname
connect
WSAStartup
setsockopt
avicap32
capCreateCaptureWindowA
Sections
.text Size: 128KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wmhlfxs Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE