Static task
static1
Behavioral task
behavioral1
Sample
NEAS.94002f5b65123506eb5b8cd385b64ad0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.94002f5b65123506eb5b8cd385b64ad0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.94002f5b65123506eb5b8cd385b64ad0.exe
-
Size
391KB
-
MD5
94002f5b65123506eb5b8cd385b64ad0
-
SHA1
af32a86d1b2b7b89d85bc633a791e7bb2aeb71e2
-
SHA256
d831eee80b003707bd88859c29bbacd5a886de4201df95a0c2d821352750e597
-
SHA512
aea5bce73837fdf5ba0d3d0ae0e55dcb66bde7bb276c275ace5a1bb81d0325906e2ca643d5b5560e736ff6adcfbc51511c44674b4dc721e4d5730c1154055af0
-
SSDEEP
3072:cT0hHxF5IAQeA7+77e5gL1U7DXLG8qfDRhPD+/M08oCNIEEjaLofEWdfa9wigop3:zxz5iqZq33qfDRhPIM1/2VPEy+TGdzRq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.94002f5b65123506eb5b8cd385b64ad0.exe
Files
-
NEAS.94002f5b65123506eb5b8cd385b64ad0.exe.exe windows:4 windows x86
8fd0e4fd88a32106d70dc98b00a121bc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
GetPrivateProfileStringA
InterlockedIncrement
CloseHandle
GetLastError
CreateProcessA
GetSystemDirectoryA
GetShortPathNameA
GetModuleFileNameA
WritePrivateProfileStringA
GetProfileIntA
GetVersion
lstrlenA
lstrcatA
GetWindowsDirectoryA
WriteProfileStringA
GlobalLock
_lclose
GlobalHandle
GlobalUnlock
GetTickCount
Sleep
GetCurrentThreadId
FreeLibrary
LoadLibraryA
GetProcAddress
FreeResource
FindResourceA
LoadResource
LockResource
_lopen
_llseek
_lread
GlobalAlloc
lstrcmpA
GetExitCodeProcess
OpenProcess
GlobalFree
MoveFileA
SetFileAttributesA
CompareStringW
CompareStringA
SetEnvironmentVariableA
CreateFileA
FlushFileBuffers
SetEndOfFile
GetStringTypeW
GetStringTypeA
SetStdHandle
LCMapStringA
RtlUnwind
LCMapStringW
GetStdHandle
SetHandleCount
GetFileType
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
MultiByteToWideChar
FreeEnvironmentStringsA
FreeEnvironmentStringsW
HeapReAlloc
GetFileAttributesA
WriteFile
SetFilePointer
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
ReadFile
HeapDestroy
GetOEMCP
HeapCreate
GetCPInfo
GetACP
GetFullPathNameA
GetCurrentProcess
GetCurrentDirectoryA
ExitProcess
DeleteFileA
TerminateProcess
GetStartupInfoA
GetModuleHandleA
GetCommandLineA
GetTimeZoneInformation
HeapFree
GetSystemTime
FindFirstFileA
GetDriveTypeA
GetLocalTime
FileTimeToSystemTime
FindClose
HeapAlloc
FileTimeToLocalFileTime
user32
ReleaseDC
CheckDlgButton
SetRect
GetClientRect
GetDC
FillRect
IsWindow
PostThreadMessageA
PeekMessageA
GetSystemMetrics
PostMessageA
ShowCursor
GetTopWindow
AttachThreadInput
GetWindowThreadProcessId
GetForegroundWindow
SetWindowPos
SetForegroundWindow
SendMessageA
SystemParametersInfoA
FindWindowExA
DestroyWindow
DispatchMessageA
GetWindow
MessageBoxA
GetWindowLongA
EnableWindow
LoadStringA
DialogBoxParamA
WaitForInputIdle
IsDlgButtonChecked
GetDlgItemTextA
KillTimer
PostQuitMessage
DefWindowProcA
RegisterClassA
SetTimer
LoadIconA
UpdateWindow
CreateWindowExA
InvalidateRect
GetWindowRect
GetParent
BeginPaint
ShowWindow
EndPaint
CreateDialogParamA
TranslateMessage
GetMessageA
IsDialogMessageA
GetDlgItem
gdi32
DeleteDC
SetDIBitsToDevice
SelectObject
CreateCompatibleDC
GetObjectA
BitBlt
RealizePalette
SelectPalette
TextOutA
SetBkColor
SetTextColor
GetStockObject
GetTextMetricsA
CreatePalette
DeleteObject
CreateDIBitmap
StretchBlt
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
Sections
.text Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ