Static task
static1
Behavioral task
behavioral1
Sample
NEAS.84f21dad95b3d13312215d6a716cfd60.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.84f21dad95b3d13312215d6a716cfd60.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.84f21dad95b3d13312215d6a716cfd60.exe
-
Size
196KB
-
MD5
84f21dad95b3d13312215d6a716cfd60
-
SHA1
667c1b56aee9612417b81a00e6735bdf1317da4b
-
SHA256
0d18885d1aeef45196f135b5b96c50d6223f81595ded984c8fa37dee60884660
-
SHA512
90a0db3ca2b57fc67cc1067e29f672031be8af7c407499830153edf12eae7c50552990935c939b20d90e27839370a4a07e6ecad51dd3dd6ffaf6b17dc16121da
-
SSDEEP
3072:TqutT/E1n940P217gMJrhBxMBynNbxicxYjt/jQDk+x3y/DkxyefUknI3t99Ey:BQ1nC0ulT/k0x9x0VQDO/DnuW9T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.84f21dad95b3d13312215d6a716cfd60.exe
Files
-
NEAS.84f21dad95b3d13312215d6a716cfd60.exe.exe windows:5 windows x86
5e2e44d8bc55aeab3ac3d85bec39922e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
hccutils
LoadBITMAP
LoadSTRINGW
LoadICON
LoadIMAGE
FindResources
kernel32
CreateEventA
InterlockedDecrement
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
RaiseException
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
lstrlenA
lstrcmpiA
GetModuleFileNameA
GetModuleHandleW
IsDBCSLeadByte
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
CreateMutexA
GetCurrentThreadId
GetCommandLineA
Sleep
GetConsoleCP
SetStdHandle
SetFilePointer
InitializeCriticalSectionAndSpinCount
GetLastError
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetStdHandle
WriteFile
HeapCreate
HeapReAlloc
VirtualFree
LCMapStringA
ExitProcess
LCMapStringW
SetLastError
TlsFree
TlsSetValue
TlsAlloc
CloseHandle
GetVersionExA
LoadLibraryA
FreeLibrary
GetModuleHandleA
GetProcAddress
FlushFileBuffers
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
UnhandledExceptionFilter
GetCurrentProcess
EnterCriticalSection
SetUnhandledExceptionFilter
LeaveCriticalSection
LocalFree
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetStartupInfoA
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
HeapFree
HeapAlloc
RtlUnwind
IsDebuggerPresent
TerminateProcess
user32
GetCursorPos
GetWindowLongW
CharNextA
CharNextW
PostThreadMessageA
SetWindowLongW
FindWindowA
SendMessageW
RegisterWindowMessageA
IsWindow
CreateDialogParamW
ShowWindow
GetDC
GetSystemMetrics
ReleaseDC
PostQuitMessage
SetTimer
KillTimer
CreatePopupMenu
AppendMenuA
SetForegroundWindow
TrackPopupMenu
DestroyIcon
DestroyWindow
GetDlgItem
SendMessageA
GetDesktopWindow
GetWindowRect
SetWindowTextW
wsprintfW
RegisterClassA
CreateWindowExA
PostMessageA
GetMessageA
DispatchMessageA
DefWindowProcA
DestroyMenu
gdi32
GetDIBits
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
SetBkColor
BitBlt
SetTextColor
DeleteDC
DeleteObject
advapi32
RegSetValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
Shell_NotifyIconW
ole32
CLSIDFromProgID
CoInitialize
CoUninitialize
StringFromGUID2
CoCreateInstance
CoSuspendClassObjects
CoTaskMemFree
CoRegisterClassObject
CoRevokeClassObject
CoTaskMemRealloc
CoTaskMemAlloc
oleaut32
SysAllocStringByteLen
SysStringByteLen
SysFreeString
SysStringLen
SysAllocString
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
VariantClear
shlwapi
StrStrIA
Sections
.text Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 66KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE