Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0ac5880cc1862e29e1683a403a64d9d0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.0ac5880cc1862e29e1683a403a64d9d0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.0ac5880cc1862e29e1683a403a64d9d0.exe
-
Size
210KB
-
MD5
0ac5880cc1862e29e1683a403a64d9d0
-
SHA1
d343babf19fe2fd46b504e7aaf67f1b1ca4d8a20
-
SHA256
cf55ec22d9c296320b624f94156080c872093a47b8018276faffdbb1d47ea042
-
SHA512
6c50fa07d714a85b9d900f23b678f83765af9e8c989bd51e5ae91f8ba1822b2a1857d52ef97a2b0ca4fc03e1af78daa7e5c76ee5dcc94edd6e64869660b2d7e0
-
SSDEEP
3072:HfI+O5HNkDxtVagroHSCpNce3oPOM7TC7BbCk+dZpp5bdAXPVaefq4Nxi/3:45YRjBh3C7dULPiPVBg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.0ac5880cc1862e29e1683a403a64d9d0.exe
Files
-
NEAS.0ac5880cc1862e29e1683a403a64d9d0.exe.exe windows:4 windows x86
291e66575f7eab098d6da15fc612df8e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDrives
ExitProcess
SetCurrentDirectoryW
GetModuleFileNameA
SetUnhandledExceptionFilter
GetFileAttributesW
SleepEx
GlobalDeleteAtom
GetExpandedNameW
lstrcpyW
GetProcAddress
CreateSemaphoreW
FileTimeToSystemTime
GetCurrentThread
GetProcessHeap
SearchPathA
GetNamedPipeInfo
CreatePipe
CreateEventW
GetModuleHandleA
MoveFileW
GetEnvironmentStringsW
GetNumberFormatA
GetLocaleInfoA
GetLocaleInfoW
GetTempPathA
GetLogicalDriveStringsW
ExpandEnvironmentStringsW
user32
SetDlgItemTextA
DefDlgProcA
GetClassLongA
PostQuitMessage
SetWindowLongW
LoadBitmapW
MessageBeep
CharUpperW
LoadMenuW
GetMessageA
CallWindowProcW
GetCursorPos
PostMessageW
GetCaretPos
CreateDesktopW
gdi32
CreateDCW
ColorCorrectPalette
GetRgnBox
SetTextAlign
GetTextColor
GetEnhMetaFileDescriptionA
UnrealizeObject
SetRectRgn
GetFontData
GetCharacterPlacementW
WidenPath
GetTextMetricsA
GetCharacterPlacementA
RemoveFontResourceExA
PaintRgn
PtVisible
LPtoDP
EndDoc
advapi32
RegOpenKeyExW
RegOpenKeyA
RegEnumValueA
RegEnumValueW
RegSaveKeyA
RegOpenKeyA
shell32
SHGetFileInfoA
SHGetFolderPathA
ole32
CoUninitialize
CoGetDefaultContext
CLSIDFromProgID
CoGetCurrentProcess
inetcomm
MimeOleGetFileInfo
EssContentHintEncodeEx
MimeOleGenerateCID
HrAthGetFileName
Sections
.ic Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.UNw Size: 2KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.NDmj Size: 3KB - Virtual size: 378KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xvpfQY Size: 512B - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cEMrQ Size: 4KB - Virtual size: 271KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.AxGj Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.FiaGd Size: 5KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Nfre Size: 2KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ctr Size: 3KB - Virtual size: 438KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.HBzd Size: 1KB - Virtual size: 466KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ