Static task
static1
Behavioral task
behavioral1
Sample
NEAS.7240c9cd21be8154eb74209e0346f880.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.7240c9cd21be8154eb74209e0346f880.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.7240c9cd21be8154eb74209e0346f880.exe
-
Size
3.3MB
-
MD5
7240c9cd21be8154eb74209e0346f880
-
SHA1
c2985498438defa6b7778b9984426e1808cc770f
-
SHA256
aa0f47d146626deabbcc5d0c34c318db7b75a97f6a3b15beecccd94b9bf0e8ce
-
SHA512
d3c3b2f5849c26eff59e2b65382e2fc22b249e2ebb4f32b5ddb1ee84b087e9a39d392971e906ba38ce5b722dae09318777370c65199ea947d9a3da84d3095a92
-
SSDEEP
98304:GULg6zQhzmmD4DaUfoEeGmo/tVi6bX0vGwBd8v:GULgXh34JeGVl/sY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.7240c9cd21be8154eb74209e0346f880.exe
Files
-
NEAS.7240c9cd21be8154eb74209e0346f880.exe.exe windows:5 windows x86
79f3c9b84316985a2c453b0e59bb42d3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
midiStreamOut
ws2_32
WSAAsyncSelect
kernel32
SetLastError
user32
IsIconic
gdi32
Escape
msimg32
GradientFill
winspool.drv
ClosePrinter
advapi32
RegOpenKeyExA
shell32
Shell_NotifyIconA
ole32
StgCreateDocfileOnILockBytes
oleaut32
SysStringLen
comctl32
_TrackMouseEvent
oledlg
ord8
comdlg32
ChooseColorA
msvcrt
malloc
iphlpapi
GetAdaptersInfo
psapi
GetMappedFileNameW
Sections
.text Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ