Static task
static1
Behavioral task
behavioral1
Sample
NEAS.04b03c2aade783238159e233a98974b0.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.04b03c2aade783238159e233a98974b0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.04b03c2aade783238159e233a98974b0.exe
-
Size
208KB
-
MD5
04b03c2aade783238159e233a98974b0
-
SHA1
7bcc4ddc12c09956bf0edae3e5529fef814b77c5
-
SHA256
e37042e0440f0e884f72b2a882915b06d111a6cce34854cc8efb70f1e963389a
-
SHA512
813ec7ccfd19fe3210c549417514558d2f8b7575e24bb8e9b325de694241ddc41d83d4d899766aa58da58aa5bc06136f7049dfe8aacefba15c8dd019e4fd12f5
-
SSDEEP
3072:mrwdkZbq7lWbIyx877YElLGcMmWv8CQySJ6dDcaW7:snZq7lWb7877Yv5Bvrz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.04b03c2aade783238159e233a98974b0.exe
Files
-
NEAS.04b03c2aade783238159e233a98974b0.exe.exe windows:4 windows x86
1716eb666e42bbf103fc0470a355b730
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
mfc42
ord3640
ord858
ord5638
ord2642
ord6215
ord4287
ord4715
ord2864
ord1871
ord3663
ord3584
ord860
ord543
ord803
ord3811
ord940
ord926
ord4129
ord4204
ord535
ord537
ord2763
ord922
ord924
ord5856
ord4277
ord6283
ord6282
ord913
ord941
ord2822
ord2764
ord2614
ord939
ord923
ord3984
ord5604
ord6199
ord2818
ord4278
ord5683
ord925
ord3408
ord3227
ord3054
ord3055
ord3425
ord5933
ord3880
ord3810
ord3573
ord3693
ord1641
ord3626
ord2414
ord4275
ord755
ord4133
ord4297
ord5788
ord5787
ord470
ord2820
ord1168
ord6141
ord414
ord713
ord5859
ord4853
ord3597
ord324
ord641
ord2302
ord4234
ord1146
ord2086
ord4376
ord4299
ord2379
ord5280
ord2582
ord4402
ord771
ord4259
ord3619
ord384
ord693
ord656
ord609
ord1199
ord2862
ord2097
ord6905
ord2370
ord2860
ord1945
ord4589
ord4588
ord4899
ord4370
ord4892
ord5076
ord4341
ord4349
ord4723
ord4890
ord4531
ord4545
ord4543
ord4526
ord4529
ord4524
ord4964
ord4961
ord4108
ord5240
ord3748
ord1726
ord5260
ord4432
ord560
ord813
ord4273
ord2100
ord4464
ord4448
ord4671
ord4676
ord5054
ord4413
ord1842
ord4242
ord2723
ord2390
ord3059
ord5100
ord5103
ord4303
ord3350
ord5012
ord975
ord5472
ord3403
ord2879
ord2878
ord4151
ord4077
ord5237
ord5282
ord2649
ord1665
ord4436
ord5252
ord4427
ord4220
ord2584
ord3654
ord541
ord554
ord529
ord527
ord366
ord674
ord794
ord796
ord807
ord3370
ord4243
ord2116
ord3294
ord6067
ord4284
ord6000
ord2117
ord2494
ord2627
ord2626
ord4163
ord686
ord3721
ord3521
ord5030
ord6403
ord1200
ord3481
ord2863
ord5861
ord3522
ord6143
ord1644
ord2455
ord4499
ord2975
ord3566
ord6402
ord3797
ord3916
ord2252
ord703
ord404
ord2301
ord3874
ord2645
ord6453
ord551
ord548
ord1907
ord2294
ord2362
ord4258
ord2358
ord6334
ord2292
ord3092
ord4055
ord2411
ord2023
ord4218
ord2578
ord4398
ord3582
ord616
ord2299
ord5873
ord6172
ord6170
ord5789
ord4615
ord4612
ord4610
ord4274
ord4486
ord2554
ord800
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord5307
ord5289
ord5714
ord4622
ord3738
ord561
ord986
ord520
ord4159
ord2621
ord1205
ord6117
ord815
ord665
ord5186
ord354
ord4698
ord2725
ord342
ord1182
ord1825
ord4238
ord4696
ord3058
ord3065
ord6336
ord2510
ord2542
ord5243
ord5740
ord5577
ord3172
ord5653
ord4420
ord4387
ord3454
ord3198
ord6080
ord4623
ord4426
ord338
ord3337
ord652
ord4823
ord1746
ord2399
ord6175
ord3499
ord2515
ord355
ord353
ord5710
ord1979
ord5442
ord3318
ord4614
ord4613
ord1849
ord4244
ord2583
ord4532
ord4403
ord5253
ord3371
ord3641
ord439
ord303
ord736
ord2652
ord1669
ord5495
ord3293
ord6270
ord6605
ord3216
ord4538
ord5572
ord2915
ord4202
ord834
ord1772
ord398
ord700
ord5594
ord4189
ord1799
ord3353
ord1194
ord290
ord614
ord403
ord5265
ord4358
ord4948
ord4976
ord4742
ord4905
ord5160
ord5162
ord5161
ord4431
ord2054
ord4439
ord4837
ord5288
ord1776
ord6055
ord2528
ord1690
ord1908
ord521
ord6307
ord4160
ord823
ord825
ord540
ord2817
ord795
ord567
ord5290
ord4424
ord3402
ord2575
ord3574
ord4396
ord489
ord3610
ord768
ord1008
ord4710
ord496
ord4080
ord4425
ord4627
ord3831
ord3079
ord3825
ord3081
ord3830
ord2976
ord3136
ord2985
ord3262
ord3147
ord4465
ord3259
ord2124
ord2982
ord5277
ord1727
ord2446
ord5261
ord6376
ord5065
ord3749
ord4441
ord2055
ord2648
ord5287
ord4835
ord3798
ord5163
ord4353
ord6374
ord4407
ord2385
ord5241
ord6052
ord1775
ord4078
ord4854
ord2514
ord4998
ord6625
ord4377
ord4457
ord2438
ord801
ord2512
ord1576
msvcrt
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
strtoul
_vsnprintf
_kbhit
strchr
_stricmp
memset
atoi
strcmp
strncpy
strlen
strstr
_strupr
_strnicmp
_ftol
strcpy
strrchr
memmove
isdigit
atol
isspace
_setmbcp
strcat
printf
_purecall
srand
time
memcmp
exit
rand
islower
isxdigit
_controlfp
toupper
_itoa
kernel32
GetTickCount
ResetEvent
CreateThread
TerminateThread
GlobalAlloc
GlobalLock
CreateEventA
GetVersionExA
GetCurrentThread
GlobalUnlock
VirtualQuery
GetModuleHandleA
IsBadWritePtr
GetCurrentProcess
SetUnhandledExceptionFilter
OutputDebugStringA
LeaveCriticalSection
WriteFile
GetModuleFileNameA
SetFileAttributesA
SetEndOfFile
ReadFile
SetFileTime
GetSystemTime
SystemTimeToFileTime
GetLastError
FormatMessageA
SetFilePointer
GetFileSize
CloseHandle
CreateFileA
DeleteCriticalSection
InitializeCriticalSection
DeleteFileA
EnterCriticalSection
Sleep
WaitForSingleObject
SetErrorMode
LoadLibraryA
FreeLibrary
lstrcpynA
ExpandEnvironmentStringsA
GetProcAddress
MapViewOfFile
CreateFileMappingA
WinExec
UnmapViewOfFile
GlobalFree
OpenFileMappingA
ReleaseMutex
MoveFileA
GetFullPathNameA
FindClose
FindFirstFileA
CreateMutexA
RemoveDirectoryA
FindNextFileA
CreateDirectoryA
GetStartupInfoA
GetLocaleInfoA
SetEvent
user32
IsIconic
KillTimer
GetDlgItem
ChangeClipboardChain
RegisterClipboardFormatA
GetParent
DrawMenuBar
SetForegroundWindow
GetClipboardData
IsClipboardFormatAvailable
GetWindowRect
GetMenuItemID
TrackPopupMenu
GetCursorPos
SetMenuDefaultItem
IsWindowVisible
SetTimer
SetClipboardViewer
AppendMenuA
CreatePopupMenu
GetSysColor
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
TranslateAcceleratorA
GetClassLongA
SetClassLongA
LoadIconA
LoadAcceleratorsA
CharToOemA
wsprintfA
RedrawWindow
GetClientRect
wvsprintfA
MessageBoxA
IsWindow
PostMessageA
EnableWindow
GetSubMenu
SetMenu
GetMenu
InflateRect
RegisterWindowMessageA
GetKeyState
InvalidateRect
ExitWindowsEx
SendMessageA
LoadMenuA
DestroyMenu
MessageBeep
gdi32
CreateFontA
ExtTextOutA
CreatePen
CreateFontIndirectA
Rectangle
CreateSolidBrush
GetObjectA
advapi32
RegEnumValueA
RegDeleteKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegDeleteValueA
RegEnumKeyExA
RegSetValueExA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
RegCloseKey
RegCreateKeyA
RegOpenKeyExA
RegQueryValueExA
shell32
Shell_NotifyIconA
SHGetMalloc
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
comctl32
ImageList_SetBkColor
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
wsock32
htons
accept
recv
WSAStartup
WSACleanup
socket
connect
WSASetLastError
gethostbyname
ioctlsocket
send
bind
listen
getsockname
closesocket
__WSAFDIsSet
select
winmm
PlaySoundA
Sections
.text Size: 112KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ