Static task
static1
Behavioral task
behavioral1
Sample
NEAS.4a01edc3eb039d5ee773ef6dafc42be0.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.4a01edc3eb039d5ee773ef6dafc42be0.dll
Resource
win10v2004-20231023-en
General
-
Target
NEAS.4a01edc3eb039d5ee773ef6dafc42be0.exe
-
Size
27KB
-
MD5
4a01edc3eb039d5ee773ef6dafc42be0
-
SHA1
58a60a173f704793210bb6c45be5b1f17fc68918
-
SHA256
34ec38dd5932e072087553285ed03bd389b4fd6861145f3110525218c165df2e
-
SHA512
6dcca11a531a4a98acdeb1ae9461dcfa56269b937872e86278541a5a61d15a51717dc5219937ff947fc6b3fa4b4e37b46e0f64ccfa33b5334c5ad7cfa3a71bda
-
SSDEEP
768:eXervNp2SwiJxDRvUS1hlTwh9CkdSe3P6:eX4vn2S5RvdUOv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.4a01edc3eb039d5ee773ef6dafc42be0.exe
Files
-
NEAS.4a01edc3eb039d5ee773ef6dafc42be0.exe.dll windows:5 windows x64
8795d1d23c30c0e7a82b605b79c2c0df
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
ntoskrnl.exe
KeDelayExecutionThread
MmGetSystemRoutineAddress
RtlInitUnicodeString
KeInitializeEvent
PsRemoveLoadImageNotifyRoutine
PsSetLoadImageNotifyRoutine
DbgPrint
PsSetCreateProcessNotifyRoutineEx
MmIsAddressValid
ObfDereferenceObject
IoThreadToProcess
PsLookupThreadByThreadId
IofCompleteRequest
IoDeleteDevice
IoDeleteSymbolicLink
RtlGetVersion
ZwClose
ZwQueryInformationFile
ZwCreateFile
_itoa_s
RtlTimeToTimeFields
ExSystemTimeToLocalTime
RtlCompareMemory
ExAllocatePoolWithTag
ExFreePoolWithTag
PsGetVersion
CmRegisterCallback
RtlCompareUnicodeString
ZwQueryValueKey
RtlAnsiStringToUnicodeString
RtlInitAnsiString
ZwSetValueKey
RtlAppendUnicodeToString
ZwCreateKey
RtlQueryRegistryValues
RtlAppendUnicodeStringToString
ZwEnumerateKey
ExAllocatePool
ZwQueryKey
ZwOpenKey
RtlCopyUnicodeString
PsCreateSystemThread
IoCreateSymbolicLink
IoCreateDevice
__C_specific_handler
atoi
strstr
strlen
_vsnprintf
KeWaitForSingleObject
IofCallDriver
IoBuildDeviceIoControlRequest
IoGetLowerDeviceObject
IoGetRelatedDeviceObject
ObReferenceObjectByHandle
KeSetEvent
MmUnlockPages
MmProbeAndLockPages
IoAllocateMdl
IoFreeMdl
Sections
.text Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 540B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE