Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0a69d4a113b45d32d6f1231cbc0e1c00.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.0a69d4a113b45d32d6f1231cbc0e1c00.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.0a69d4a113b45d32d6f1231cbc0e1c00.exe
-
Size
203KB
-
MD5
0a69d4a113b45d32d6f1231cbc0e1c00
-
SHA1
cc76bee1753e9be4424742e75d12f59a8d8f9877
-
SHA256
05f3f8a5643f1c6e4dd6b77618cf1a890ac1d181807cf49bb3777779f2d49946
-
SHA512
b787df47829aa2557b860320fcd2c4321db74b4ec55ce915b6310bda5fde4dc6430f8227a51bea39f570ff4cf801292c8550d0b1c5f81a7da3ebc8d9e76e5a89
-
SSDEEP
6144:6Rh8kXpF13fIRmPXP8AYxrtAbUR6A8U5j:U/D6o3YAbURT8U5j
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.0a69d4a113b45d32d6f1231cbc0e1c00.exe
Files
-
NEAS.0a69d4a113b45d32d6f1231cbc0e1c00.exe.exe windows:1 windows x86
efd64979adc7f9e8aae1d77756433b49
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
RtlUnwind
GetModuleHandleW
crtdll
__GetMainArgs
exit
raise
signal
ulib
??1ARGUMENT_LEXEMIZER@@UAE@XZ
??0DSTRING@@QAE@XZ
??0STRING_ARGUMENT@@QAE@XZ
??0ARRAY@@QAE@XZ
??0ARGUMENT_LEXEMIZER@@QAE@XZ
??0FLAG_ARGUMENT@@QAE@XZ
?Initialize@ARRAY@@QAEEKK@Z
?Initialize@ARGUMENT_LEXEMIZER@@QAEEPAVARRAY@@@Z
?SetCaseSensitive@ARGUMENT_LEXEMIZER@@QAEXE@Z
?PrepareToParse@ARGUMENT_LEXEMIZER@@QAEEPAVWSTRING@@@Z
ntdll
RtlFreeHeap
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 7KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 178KB - Virtual size: 178KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ