Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0b4bb16931fe450fd26d0edbf275bdc0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.0b4bb16931fe450fd26d0edbf275bdc0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.0b4bb16931fe450fd26d0edbf275bdc0.exe
-
Size
2.0MB
-
MD5
0b4bb16931fe450fd26d0edbf275bdc0
-
SHA1
ae6fd74e64843406abd4becbebc3063ce01bf481
-
SHA256
46a5b2b2390cd5f0d0f2ed00c7e0c136487370401c007f80012db33346226954
-
SHA512
53e398fc2afc7a1c8ca29f8d7d950b647b0433dc6b2625fd22ee6f3f7cf9a9ce7662344a47698f4e2b2624f886a8d39a0e2c5bcbec62f2f66bcac6f270ae2c35
-
SSDEEP
49152:r+CQS88KQUnnhs3Y/cuupzmvWr356LDcdfP7CLTdMy+z:6S8jQIq3Ydrvg3aDc970Tqy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.0b4bb16931fe450fd26d0edbf275bdc0.exe
Files
-
NEAS.0b4bb16931fe450fd26d0edbf275bdc0.exe.exe windows:5 windows x86
f016d9c09070f637d34f03c3d3b071e5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
GetModuleHandleW
lstrlenW
WideCharToMultiByte
MoveFileExW
GetTempFileNameW
GetTempPathW
DeleteFileW
MoveFileW
WriteFile
ReadFile
GetFileSize
CreateFileW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
SleepEx
SetFileAttributesW
GetModuleFileNameW
GetComputerNameA
Sleep
GetCurrentProcessId
GetSystemTime
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
HeapFree
ExitThread
GetCurrentThreadId
CreateThread
SetUnhandledExceptionFilter
ExitProcess
DecodePointer
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
MultiByteToWideChar
HeapReAlloc
HeapSize
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
FreeLibrary
InterlockedExchange
GetStringTypeW
SetStdHandle
WriteConsoleW
SetEndOfFile
GetProcessHeap
WaitForSingleObject
CloseHandle
GetLastError
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcess
GetModuleHandleA
CreateProcessW
LoadLibraryW
SystemTimeToFileTime
GetLocalTime
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
LoadLibraryA
GetFileType
LocalAlloc
WaitForMultipleObjects
VirtualQueryEx
ReadProcessMemory
ProcessIdToSessionId
Module32FirstW
Module32NextW
GetProcAddress
advapi32
CreateProcessAsUserW
LookupPrivilegeValueW
AdjustTokenPrivileges
RegQueryValueExW
CreateServiceW
RegSetValueExW
RegCreateKeyExW
OpenSCManagerW
OpenServiceW
QueryServiceConfigW
ChangeServiceConfigW
StartServiceW
CloseServiceHandle
RegCloseKey
RegOpenKeyExW
CryptAcquireContextW
CryptReleaseContext
GetUserNameW
GetUserNameA
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
OpenProcessToken
shell32
ShellExecuteW
SHGetSpecialFolderPathW
psapi
GetModuleFileNameExW
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
Sections
.text Size: 571KB - Virtual size: 571KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.cdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 340KB - Virtual size: 339KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ