Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d4310a914db43d9f55d22ca26c9c0230.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.d4310a914db43d9f55d22ca26c9c0230.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.d4310a914db43d9f55d22ca26c9c0230.exe
-
Size
119KB
-
MD5
d4310a914db43d9f55d22ca26c9c0230
-
SHA1
fe96d8598356ce33535e01d9ff36f6264b792c0a
-
SHA256
4d2c6c7d6a3d8029381d4e4e93ab492c4b0f6088415d1861fff8d75b451e7cbf
-
SHA512
53b36de546d627608cb35ba7d9927ab927a7ab9853dfdca4301b590e141026c2af3c004516bf6785736530b52e90156843f3c7836d20aeb6b024b2e59d4da537
-
SSDEEP
3072:AScN+tnsgV99KQocHA4LB10p08BMXFg9xWJLx67:Atinsgz9PorUkBSm9wL4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.d4310a914db43d9f55d22ca26c9c0230.exe
Files
-
NEAS.d4310a914db43d9f55d22ca26c9c0230.exe.exe windows:4 windows x86
2d99cb52405d330aa2d24498461850d8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNextVDMCommand
GetBinaryTypeA
FindActCtxSectionStringA
CompareStringA
WerRegisterFile
GetConsoleWindow
GetVolumePathNameW
SetConsoleInputExeNameW
LocalAlloc
CreatePrivateNamespaceA
GetProcessId
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 105KB - Virtual size: 126KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE