Static task
static1
Behavioral task
behavioral1
Sample
NEAS.c8d8d1d9c8bb015171c7fd8704a47560.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.c8d8d1d9c8bb015171c7fd8704a47560.dll
Resource
win10v2004-20231020-en
General
-
Target
NEAS.c8d8d1d9c8bb015171c7fd8704a47560.exe
-
Size
6.1MB
-
MD5
c8d8d1d9c8bb015171c7fd8704a47560
-
SHA1
18d8ff50daeb8100fe07d5aefefc2fa70a2c779b
-
SHA256
ec490f43a503b7c8a5d1b2106983f9ef73708736b1ebf6ab333bcbaddc542a04
-
SHA512
f107d56506021d725117bd4fb04c5e8e530b378467ec042b159d5f542884538d078e18c08b8c04c68cfc6cd58446ae75019e725268d6cb3f62b58e461ad45f0c
-
SSDEEP
768:wIL+dQ/EIBM8v4h1000000000000000000000000:3+S/EIPv4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.c8d8d1d9c8bb015171c7fd8704a47560.exe
Files
-
NEAS.c8d8d1d9c8bb015171c7fd8704a47560.exe.dll windows:4 windows x86
17f77cfebbfdd32d0cb81bca8c119dde
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
lstrcmpiA
GetProcAddress
LoadLibraryA
TerminateProcess
OpenProcess
GlobalFree
OutputDebugStringA
SizeofResource
LockResource
LoadResource
FindResourceA
VirtualFree
VirtualAlloc
VirtualQueryEx
ReadProcessMemory
GetThreadContext
CreateProcessA
ResumeThread
SetThreadContext
WriteProcessMemory
GetModuleHandleA
VirtualProtectEx
VirtualAllocEx
GetLastError
CreateMutexA
OpenEventA
user32
wsprintfA
msvcrt
??2@YAPAXI@Z
free
_initterm
malloc
_adjust_fdiv
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 944B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 564B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 346B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ