Static task
static1
Behavioral task
behavioral1
Sample
NEAS.080dc64562cffdc6467a426cf2cdab60.exe
Resource
win7-20231020-en
General
-
Target
NEAS.080dc64562cffdc6467a426cf2cdab60.exe
-
Size
405KB
-
MD5
080dc64562cffdc6467a426cf2cdab60
-
SHA1
4f2d858c625bd4b89de141644f8e2257751b416e
-
SHA256
9b9d03f2bd27f64e6670808f3786fe0afd4f18d71476d9c31d261f502743a223
-
SHA512
8de7fb16a630faf297553fd3a9d3485a60780fc546fc14bfd14cdaea2c25dc8f1db31a37e580b6c1bef6033b5929f802db8bb7e5b4cca8d9e39bb20620f53cd1
-
SSDEEP
6144:bDd3RsctLYkFkmkUx1BR93cb0KSyEgBPXmR1p3sbRPpJj31VXEB4:bDTLLvkmjR9+0KjHBP2RHs7U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.080dc64562cffdc6467a426cf2cdab60.exe
Files
-
NEAS.080dc64562cffdc6467a426cf2cdab60.exe.exe windows:5 windows x86
ff318e951c2ef4ed368114521a14dba3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
CreateMutexA
CreateDirectoryA
GetProcAddress
LoadLibraryExA
CreateEventA
GetTempPathA
SetEvent
WritePrivateProfileStringA
CopyFileA
GetPrivateProfileStringA
GetLocalTime
GetComputerNameA
Process32First
CreateToolhelp32Snapshot
DeleteFileA
FindNextFileA
FindFirstFileA
GetModuleFileNameA
LeaveCriticalSection
EnterCriticalSection
Sleep
CreateThread
DeleteCriticalSection
Process32Next
WaitForSingleObject
InitializeCriticalSection
FindResourceA
LoadResource
LockResource
FormatMessageA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
SetLastError
MoveFileA
LoadLibraryA
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetCurrentProcess
FindClose
GetVolumeInformationA
GetFullPathNameA
CompareStringA
GetModuleHandleW
GetModuleHandleA
InterlockedIncrement
InterlockedDecrement
FreeLibrary
GetCurrentProcessId
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalGetAtomNameA
lstrcmpA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileAttributesA
GetFileSizeEx
GetFileTime
GlobalAddAtomA
GlobalFlags
GetCurrentThreadId
GetVersionExA
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GetLocaleInfoA
GetCPInfo
GetOEMCP
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
VirtualAlloc
HeapReAlloc
HeapSize
ExitProcess
GetACP
IsValidCodePage
SetHandleCount
GetStdHandle
GetFileType
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
HeapCreate
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
SizeofResource
ReadFile
GetFileSize
CreateFileA
LocalAlloc
LocalFree
CloseHandle
GetLastError
MultiByteToWideChar
WideCharToMultiByte
user32
CopyRect
AdjustWindowRectEx
RegisterClassA
GetClassInfoA
GetClassInfoExA
GetClientRect
SetForegroundWindow
SetMenu
MapWindowPoints
GetMessagePos
GetMessageTime
GetTopWindow
GetForegroundWindow
RemovePropA
GetPropA
SetPropA
GetClassLongA
GetCapture
WinHelpA
CheckMenuItem
EnableMenuItem
ModifyMenuA
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
DestroyMenu
GetDlgItem
CallWindowProcA
SetWindowsHookExA
CallNextHookEx
GetKeyState
PeekMessageA
ValidateRect
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
GetWindowTextA
GetWindowThreadProcessId
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
UnhookWindowsHookEx
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
CharUpperA
GetSystemMetrics
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
RegisterWindowMessageA
SetTimer
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowPos
InvalidateRect
KillTimer
FindWindowA
PostMessageA
DestroyWindow
DefWindowProcA
BeginPaint
EndPaint
PostQuitMessage
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
UpdateWindow
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
GetMenu
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetWindowLongA
IsWindow
SendMessageA
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
shlwapi
PathFindFileNameA
PathIsUNCA
PathStripToRootA
PathIsDirectoryA
wininet
InternetCloseHandle
HttpOpenRequestA
HttpAddRequestHeadersA
InternetSetOptionA
HttpQueryInfoA
InternetReadFile
HttpSendRequestA
InternetOpenA
InternetConnectA
InternetAttemptConnect
ws2_32
sendto
inet_addr
gethostbyname
ntohs
getsockname
bind
WSARecvFrom
WSAGetLastError
WSAGetOverlappedResult
gethostname
htons
WSASocketA
WSACleanup
WSACloseEvent
closesocket
WSASetEvent
WSAStartup
WSACreateEvent
urlmon
URLDownloadToFileA
iphlpapi
GetAdaptersInfo
oleacc
LresultFromObject
CreateStdAccessibleObject
gdi32
DeleteDC
CreateBitmap
GetStockObject
DeleteObject
SaveDC
RestoreDC
SetBkColor
ExtTextOutA
SetTextColor
SetMapMode
GetClipBox
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
ScaleWindowExtEx
PtVisible
RectVisible
TextOutA
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
GetDeviceCaps
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
comdlg32
GetFileTitleA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 218KB - Virtual size: 218KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rmnet Size: 56KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE