Static task
static1
Behavioral task
behavioral1
Sample
NEAS.dfd42ad3d4fe34d80329b804bf458e40.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.dfd42ad3d4fe34d80329b804bf458e40.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.dfd42ad3d4fe34d80329b804bf458e40.exe
-
Size
70KB
-
MD5
dfd42ad3d4fe34d80329b804bf458e40
-
SHA1
05742fdaa341451279dac0dda47e738a33cd770a
-
SHA256
07c2d2371b3c258017a38df1934969c8c90f4272cc909f5f12ab19a68107470f
-
SHA512
cdbea88b2458c61bd16b5803b2f28c8b82fc8ecb9463fd6c389204c049189100e63691e1cabdb7f65fc1ada55479540e1b4abcdf05707520a9324af2759dcf30
-
SSDEEP
768:TCa4ovAt0eG1WntjCutoX8bCW9T4r235E1urE9EdjNtxUFI7:n4cc0eG8nb4rslJc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.dfd42ad3d4fe34d80329b804bf458e40.exe
Files
-
NEAS.dfd42ad3d4fe34d80329b804bf458e40.exe.exe windows:4 windows x86
2c9726be88e0cc57369d800c8462696c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileTime
CreateDirectoryW
GetComputerNameW
GlobalMemoryStatus
GetVersionExW
ExitProcess
VirtualProtect
GetModuleHandleW
UnmapViewOfFile
GetFileTime
VirtualQuery
GetCurrentProcessId
CreateFileMappingW
GetTickCount
CreateMutexW
ReleaseMutex
OpenMutexW
GetCommandLineW
GetDriveTypeW
GetDiskFreeSpaceExW
GetVolumeInformationW
RemoveDirectoryW
DeleteFileW
LocalLock
LocalUnlock
GetEnvironmentVariableW
PeekNamedPipe
CreateThread
Sleep
GetFullPathNameW
LoadLibraryW
GetProcAddress
FreeLibrary
GetTempPathW
GetTempFileNameW
CreatePipe
CreateProcessW
HeapFree
WaitForSingleObject
ReadFile
MultiByteToWideChar
GetLastError
TerminateProcess
WideCharToMultiByte
VirtualFree
VirtualAlloc
GetModuleFileNameW
GetSystemDirectoryW
MoveFileW
CopyFileW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
OpenProcess
LocalAlloc
LocalFree
GetCurrentProcess
CloseHandle
FindFirstFileW
FindNextFileW
FindClose
GetWindowsDirectoryW
CreateFileW
GetFileSize
SetFilePointer
GetLocalTime
WriteFile
GetProcessHeap
HeapAlloc
MapViewOfFile
user32
GetDesktopWindow
wsprintfW
GetClientRect
GetActiveWindow
DrawTextExW
GetIconInfo
ExitWindowsEx
MessageBoxW
gdi32
SelectObject
SetTextColor
SetBkColor
SetBkMode
DeleteObject
DeleteDC
CreateDCW
GetDIBits
GetObjectW
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
CreateFontW
GetBitmapBits
advapi32
CloseServiceHandle
ChangeServiceConfig2W
RegCreateKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
GetUserNameW
LsaNtStatusToWinError
LookupAccountSidW
DuplicateTokenEx
ImpersonateLoggedOnUser
CreateProcessAsUserW
GetSecurityInfo
GetNamedSecurityInfoW
BuildExplicitAccessWithNameW
SetEntriesInAclW
SetNamedSecurityInfoW
AllocateAndInitializeSid
GetTokenInformation
GetLengthSid
InitializeAcl
AddAccessDeniedAce
SetSecurityInfo
FreeSid
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
StartServiceCtrlDispatcherW
StartServiceW
RegisterServiceCtrlHandlerW
SetServiceStatus
OpenServiceW
DeleteService
OpenSCManagerW
CreateServiceW
shell32
SHGetFileInfoW
ntdll
wcscmp
_wcsnicmp
wcsncmp
wcslen
wcsstr
memmove
ZwTerminateThread
NtVdmControl
RtlInitUnicodeString
ZwOpenSection
ZwClose
ZwQuerySystemInformation
_chkstk
wcscpy
wcschr
wcsrchr
wcscat
sprintf
vsprintf
_wcsicmp
ws2_32
closesocket
WSAStartup
htonl
bind
WSAGetLastError
listen
ntohs
accept
ioctlsocket
select
__WSAFDIsSet
socket
htons
inet_addr
gethostbyname
connect
recv
send
inet_ntoa
getpeername
mpr
WNetEnumResourceW
WNetOpenEnumW
WNetCloseEnum
Sections
.text Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.yygw Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE