Static task
static1
Behavioral task
behavioral1
Sample
NEAS.19884f55edba360aaffed5e7f41f1fd0.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.19884f55edba360aaffed5e7f41f1fd0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.19884f55edba360aaffed5e7f41f1fd0.exe
-
Size
860KB
-
MD5
19884f55edba360aaffed5e7f41f1fd0
-
SHA1
c335eb6e89bf2d61d11a6c8e70c9dbe3c97d3e7b
-
SHA256
0751060ffb4a62448760e68d87e8971e0bbc876a2177eb2833fa8847a43cb77e
-
SHA512
21326f4f47fdd84ae257af93d4c07eef8eeff64e0531d6972dd0eb9c5b03fca0970ee184a2afdadfa2f9de293ea2a420efacbcf16877fc6768c11e6fbe19323a
-
SSDEEP
12288:6LIbp0owHD4tyFpUW+T/rQyHHfd1TLTR6hRAEsltrEG7XVGEhlEJatn1K8Gvo9bq:jxwHMkbsDrQyFrIqXlxE+XoUeJako9b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.19884f55edba360aaffed5e7f41f1fd0.exe
Files
-
NEAS.19884f55edba360aaffed5e7f41f1fd0.exe.exe windows:4 windows x86
67aada3f714f02ec121dd22d40c5132d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcp71
?_Nomemory@std@@YAXXZ
??$?6U?$char_traits@D@std@@@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@E@Z
??$?MDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??$?6U?$char_traits@D@std@@@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@K@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@M@Z
??$?6U?$char_traits@D@std@@@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@D@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@N@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@J@Z
?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@PADH@Z
?get@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEHXZ
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@PBDHH@Z
?fail@ios_base@std@@QBE_NXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
mfc71
ord1594
ord2403
ord2415
ord2392
ord2396
ord2398
ord2400
ord2390
ord5233
ord5235
ord2131
ord5491
ord731
ord3307
ord1587
ord4564
ord3312
ord1588
ord1646
ord1395
ord1161
ord4118
ord4306
ord4591
ord5174
ord565
ord756
ord4273
ord1361
ord3344
ord5151
ord3974
ord4861
ord4864
ord4379
ord4384
ord4381
ord4399
ord4401
ord4386
ord4777
ord4181
ord4172
ord4980
ord4781
ord4204
ord4790
ord4443
ord4444
ord3591
ord3682
ord4264
ord616
ord368
ord4482
ord6043
ord5934
ord2768
ord3040
ord4222
ord1922
ord4705
ord4739
ord4852
ord4257
ord5495
ord2742
ord5412
ord1379
ord5592
ord5156
ord2051
ord2016
ord6238
ord2621
ord2614
ord4566
ord3450
ord3645
ord334
ord5119
ord3653
ord3499
ord635
ord5010
ord1572
ord2246
ord1913
ord2615
ord5009
ord5013
ord4309
ord4135
ord2940
ord4904
ord944
ord5356
ord2992
ord2425
ord2424
ord4020
ord1557
ord5915
ord1620
ord1617
ord3945
ord1402
ord4244
ord5148
ord1904
ord5073
ord6275
ord4185
ord5207
ord2173
ord1306
ord3403
ord4722
ord4277
ord1600
ord5960
ord923
ord928
ord932
ord930
ord934
ord2410
ord2394
ord2413
ord2408
ord2385
ord2387
ord2405
ord2178
ord2172
ord1522
ord6279
ord3802
ord6277
ord3345
ord4967
ord1362
ord1963
ord1656
ord1655
ord1599
ord5200
ord2537
ord2731
ord2835
ord4307
ord2714
ord2862
ord2540
ord2646
ord2533
ord3718
ord3719
ord3709
ord2644
ord3949
ord4486
ord4265
ord5168
ord764
ord430
ord3641
ord5182
ord4212
ord4890
ord4580
ord2020
ord1671
ord1670
ord1551
ord5912
ord3946
ord1401
ord5152
ord1908
ord5203
ord4282
ord5175
ord1964
ord4262
ord3182
ord605
ord354
ord4394
ord4648
ord1084
ord876
ord2657
ord1794
ord4735
ord3684
ord1397
ord6266
ord1933
ord1484
ord1570
ord4237
ord5214
ord4261
ord3229
ord657
ord3210
ord1934
ord3163
ord1280
ord2902
ord4099
ord2091
ord2991
ord572
ord578
ord326
ord3406
ord310
ord2367
ord266
ord2095
ord1591
ord4240
ord3317
ord2164
ord3161
ord1279
ord5637
ord4123
ord4001
ord1903
ord5731
ord304
ord602
ord347
ord5613
ord2264
ord709
ord501
ord2019
ord333
ord1123
ord781
ord741
ord1780
ord1884
ord5641
ord502
ord2086
ord1545
ord4232
ord3164
ord587
ord6067
ord2372
ord1647
ord1589
ord3315
ord739
ord3760
ord736
ord3337
ord760
ord4125
ord1931
ord1483
ord4098
ord2089
ord1547
ord4234
ord3171
ord591
ord1554
ord3195
ord620
ord5985
ord5059
ord6090
ord1425
ord907
ord2899
ord2322
ord3761
ord911
ord630
ord3088
ord2021
ord385
ord3997
ord2747
ord1892
ord2468
ord297
ord1781
ord1880
ord2263
ord4100
ord2094
ord3244
ord1955
ord1283
ord5640
ord6144
ord3654
ord3500
ord606
ord3757
ord1604
ord1914
ord5011
ord5014
ord4310
ord2939
ord943
ord2426
ord4021
ord1905
ord5208
ord4278
ord4267
ord748
ord742
ord751
ord5169
ord4041
ord2098
ord1650
ord1207
ord4243
ord2983
ord3324
ord562
ord553
ord431
ord2003
ord2145
ord2144
ord5725
ord5859
ord4299
ord4930
ord4250
ord5833
ord784
ord1482
ord3883
ord5868
ord2870
ord2370
ord3991
ord2884
ord2867
ord3680
ord1654
ord1598
ord3328
ord754
ord1489
ord6118
ord299
ord2933
ord1091
ord3799
ord3056
ord3676
ord1063
ord3642
ord1552
ord6014
ord4196
ord3929
ord5355
ord3987
ord1912
ord2081
ord2077
ord2039
ord1352
ord4986
ord1343
ord1347
ord5913
ord5145
ord6269
ord5202
ord5161
ord3183
ord357
ord1962
ord4469
ord4467
ord3683
ord5213
ord6306
ord3110
ord2371
ord2878
ord5929
ord4038
ord4014
ord6278
ord3801
ord6276
ord4326
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord1920
ord2931
ord5224
ord5226
ord3948
ord4568
ord5230
ord5566
ord2838
ord4481
ord3333
ord651
ord757
ord416
ord566
ord3389
ord5403
ord3934
ord2248
ord908
ord6179
ord5529
ord959
ord437
ord4031
ord5975
ord1564
ord1054
ord593
msvcr71
_cexit
exit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__security_error_handler
_controlfp
_ismbblead
_XcptFilter
_exit
_c_exit
__dllonexit
?terminate@@YAXXZ
??1type_info@@UAE@XZ
memset
_callnewh
ftell
fflush
_findfirst
atol
_findnext
_findclose
_splitpath
strncat
strchr
time
strtoul
sscanf
strncpy
_vsnprintf
tolower
_purecall
??0exception@@QAE@XZ
??1exception@@UAE@XZ
_except_handler3
fclose
_stricmp
fopen
fprintf
fwrite
fread
fscanf
??0exception@@QAE@ABV0@@Z
_setmbcp
_strupr
_stat
_itoa
__CxxFrameHandler
_CxxThrowException
_onexit
sprintf
atof
malloc
free
atoi
strtok
fgets
fseek
kernel32
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
ExitProcess
GetStartupInfoA
GetModuleHandleA
DeleteCriticalSection
InitializeCriticalSection
GetModuleFileNameA
CreateProcessA
GetCurrentDirectoryA
SetCurrentDirectoryA
LoadLibraryA
GetProcAddress
GetVersionExA
user32
ClientToScreen
IsZoomed
BringWindowToTop
UpdateWindow
LoadBitmapA
CheckMenuItem
GetMenu
LoadCursorA
LoadIconA
MessageBoxA
SetTimer
DrawFrameControl
GetScrollPos
SetScrollRange
AppendMenuA
ShowCursor
SetCursor
MessageBeep
GetCursor
EnableScrollBar
IsWindow
GetParent
PostMessageA
PeekMessageA
TranslateMessage
DispatchMessageA
GetCursorPos
InvalidateRect
ReleaseDC
GetDC
ScreenToClient
EnableWindow
SendMessageA
GetSystemMetrics
CreatePopupMenu
GetClientRect
GetWindowRect
PtInRect
FrameRect
FillRect
CopyRect
GetAsyncKeyState
gdi32
CreateCompatibleBitmap
GetTextExtentPoint32A
Ellipse
CreateSolidBrush
GetObjectA
Polygon
BitBlt
CreateCompatibleDC
comctl32
ImageList_SetBkColor
ImageList_ReplaceIcon
ole32
CoCreateGuid
Sections
.text Size: 168KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 600KB - Virtual size: 598KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ