Static task
static1
Behavioral task
behavioral1
Sample
NEAS.642677da9272af94f33a8f8a4d724ab0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.642677da9272af94f33a8f8a4d724ab0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.642677da9272af94f33a8f8a4d724ab0.exe
-
Size
15KB
-
MD5
642677da9272af94f33a8f8a4d724ab0
-
SHA1
e8189dc27bf34dac88d4e7cafef095cedfd0485f
-
SHA256
98cb4180079bf5a6a46b79e11a152d5943bfd5856a81598b819aac1ef48d444d
-
SHA512
592ff59c57a336682b2bc77f7b172b73d30076f40442b358858558a03e25ff64781afeff8129169c5f25791beb1fb41b9ba1391b14de5293b88bf75416e2d8fb
-
SSDEEP
384:QfFLUn7hPbm5dD7vV0r7ViGzlSY2CVLJ:Q9LU7hPbmfvV0r7ViGzlSYjL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.642677da9272af94f33a8f8a4d724ab0.exe
Files
-
NEAS.642677da9272af94f33a8f8a4d724ab0.exe.exe windows:4 windows x86
25338c077dd7a82ad2f53d4a94095dd8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
sql
HebrewFilter
TabulaMessageBox
IsamModuleCheckOK
IsamTmpPath
IsamSigInterrupt
sql_signal_remove_tmpfiles
IsamSigMark
IsamExit
sql_prep
sql_set_memory
IsamFree
IsamKillMsg
IsamAlloc
WinSandGlass
msvcr71
fopen
vsprintf
atoi
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
exit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
__dllonexit
_onexit
_controlfp
strlen
strcat
vfprintf
getenv
getc
strcpy
_iob
freopen
_fmode
__p___argv
__p___argc
kernel32
GetVersion
GetStartupInfoA
GetModuleHandleA
GetCurrentProcessId
user32
CreateWindowExA
GetSystemMetrics
RegisterClassA
DispatchMessageA
TranslateMessage
PeekMessageA
DefWindowProcA
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE