Static task
static1
Behavioral task
behavioral1
Sample
NEAS.e1694dc6a91068faed8df4cfaffb5a60.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.e1694dc6a91068faed8df4cfaffb5a60.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.e1694dc6a91068faed8df4cfaffb5a60.exe
-
Size
65KB
-
MD5
e1694dc6a91068faed8df4cfaffb5a60
-
SHA1
b26f700b4b887a08626df69c63b52459568f3211
-
SHA256
48f39886fd08b5f6f053eadbb8fe5c0ac5ec35583ee838fcb0266e20b899b986
-
SHA512
f6284f1c23f794a4460cbec44f6e0eebc61a57759ed001999e478f09ae10b2053be2f87e2b747a2df5a42e2abfe4d941c15a8e2e4d98866d813f54397cebb051
-
SSDEEP
1536:pW6XP8GnC4xc1uR5chpjjag1ef+BjE1NXyRkuackL:46XEGnxc1uR5cfj2g1eGBwHXyRk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.e1694dc6a91068faed8df4cfaffb5a60.exe
Files
-
NEAS.e1694dc6a91068faed8df4cfaffb5a60.exe.exe windows:6 windows x86
dc4095750abdb7cfbed0eba7ab07bf8b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumValueW
RegEnumKeyExW
OpenProcessToken
RegDeleteKeyW
RegOpenCurrentUser
RegQueryValueExW
kernel32
InterlockedIncrement
InterlockedDecrement
LoadLibraryW
GetProcAddress
GetModuleHandleW
lstrcmpiW
HeapDestroy
SetEvent
CreateThread
CreateEventW
LeaveCriticalSection
EnterCriticalSection
lstrcpynW
GetModuleFileNameW
FreeLibrary
lstrcatW
lstrlenA
DeleteCriticalSection
LoadResource
FindResourceW
LoadLibraryExW
Sleep
GetCurrentThreadId
GetCommandLineW
SetLastError
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
OutputDebugStringA
InitializeCriticalSection
GetLastError
lstrcpyW
lstrlenW
MultiByteToWideChar
VirtualQuery
GetSystemInfo
VirtualAlloc
ProcessIdToSessionId
GetExitCodeThread
LocalAlloc
LocalFree
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
VirtualProtect
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
GetVersionExW
WaitForSingleObject
CloseHandle
SizeofResource
user32
CharPrevW
DispatchMessageW
GetMessageW
PostThreadMessageW
CharNextW
UpdatePerUserSystemParameters
msvcrt
_amsg_exit
_vsnwprintf
memset
malloc
free
realloc
memcpy
__CxxFrameHandler3
_purecall
_CxxThrowException
_controlfp
_onexit
_lock
__dllonexit
_unlock
??1type_info@@UAE@XZ
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_callnewh
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
?what@exception@@UBEPBDXZ
??0exception@@QAE@XZ
_vsnprintf
ole32
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemFree
CoTaskMemAlloc
CoInitialize
CoInitializeSecurity
CoUninitialize
CoCreateInstance
CoTaskMemRealloc
oleaut32
SysFreeString
LoadTypeLi
RegisterTypeLi
SysStringLen
VarUI4FromStr
LoadRegTypeLi
SysAllocString
Sections
.text Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pirugno Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE