Static task
static1
Behavioral task
behavioral1
Sample
NEAS.b6d8ed43bc5249e0141cc261197750e0.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.b6d8ed43bc5249e0141cc261197750e0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.b6d8ed43bc5249e0141cc261197750e0.exe
-
Size
1.1MB
-
MD5
b6d8ed43bc5249e0141cc261197750e0
-
SHA1
f41b0fb67ba82e94384d7cfade93b6d2a317a73d
-
SHA256
10214d016a0b702435ce18798651e018e6807746a797f228f22ced7496cd62a0
-
SHA512
8b1e3494febee179ee48362a66f81f44a7dc9a572f96c29ed21391d6c95847849c8841fc854e60ae3537571a796cc283d4c0a43651a5d6059ea55ea53c5c6fb5
-
SSDEEP
24576:NCzxLvD6f2LC90B1l3PjAb7x+VTEp6oeT6VsOUVS:NQxLr6YCKl/4cVT7H6VsO0S
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.b6d8ed43bc5249e0141cc261197750e0.exe
Files
-
NEAS.b6d8ed43bc5249e0141cc261197750e0.exe.exe windows:4 windows x86
85b733f0ec44ad37e45c34a4d3afa0e8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalUnlock
GlobalLock
GlobalAlloc
CloseHandle
SetFileTime
CompareFileTime
SearchPathW
GetShortPathNameW
GetFullPathNameW
MoveFileW
SetCurrentDirectoryW
GetFileAttributesW
GetLastError
CreateDirectoryW
SetFileAttributesW
Sleep
GetTickCount
GetFileSize
GetModuleFileNameW
GetCurrentProcess
CopyFileW
ExitProcess
GetWindowsDirectoryW
GetTempPathW
GetCommandLineW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrcatW
lstrlenW
LoadLibraryW
VirtualAlloc
VirtualProtect
lstrcpynA
GetDiskFreeSpaceW
CreateThread
CreateProcessW
RemoveDirectoryW
lstrcmpiA
CreateFileW
GetTempFileNameW
lstrcpyA
GetSystemDirectoryW
GetVersion
GetProcAddress
LoadLibraryA
GetModuleHandleA
lstrcmpW
ExpandEnvironmentStringsW
GlobalFree
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleW
LoadLibraryExW
FreeLibrary
WritePrivateProfileStringW
MulDiv
GetPrivateProfileStringW
WideCharToMultiByte
lstrlenA
WriteFile
ReadFile
MultiByteToWideChar
SetFilePointer
FindClose
FindNextFileW
FindFirstFileW
DeleteFileW
GlobalSize
SetErrorMode
user32
SetClassLongW
IsWindowEnabled
GetSysColor
GetWindowLongW
SetCursor
LoadCursorW
CheckDlgButton
GetAsyncKeyState
IsDlgButtonChecked
GetMessagePos
LoadBitmapW
CallWindowProcW
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
AppendMenuW
GetSystemMenu
GetSystemMetrics
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharPrevW
CharNextA
wsprintfA
wvsprintfW
DispatchMessageW
PeekMessageW
RegisterClassW
DialogBoxParamW
CharNextW
ExitWindowsEx
DestroyWindow
CreateDialogParamW
SetTimer
SetWindowTextW
EnableMenuItem
GetWindowRect
ScreenToClient
SetWindowPos
EndDialog
CreatePopupMenu
GetClassInfoW
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfW
SendMessageTimeoutW
IsWindow
GetDlgItem
SetWindowLongW
GetClientRect
LoadImageW
GetDC
EnableWindow
InvalidateRect
SendMessageW
FindWindowExW
gdi32
SetBkMode
SetBkColor
CreateBrushIndirect
DeleteObject
GetDeviceCaps
SetTextColor
CreateFontIndirectW
shell32
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetFileInfoW
ShellExecuteW
SHFileOperationW
SHGetSpecialFolderLocation
advapi32
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegEnumKeyW
RegOpenKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumValueW
RegCloseKey
comctl32
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
ole32
CLSIDFromString
OleInitialize
OleUninitialize
CoTaskMemFree
StringFromGUID2
CoCreateInstance
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
Sections
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 464KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: - Virtual size: 5.1MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ