Static task
static1
Behavioral task
behavioral1
Sample
NEAS.a57d5fe647546ad9768a224f5865dd80.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.a57d5fe647546ad9768a224f5865dd80.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.a57d5fe647546ad9768a224f5865dd80.exe
-
Size
837KB
-
MD5
a57d5fe647546ad9768a224f5865dd80
-
SHA1
04d4749858fbcd48f8724e006865b63c14280f69
-
SHA256
5588406c49a7844c518c957adc49a73a12893578999c60497d1530ae6704014f
-
SHA512
a2a8d59859c9916106d2e4bcbfd38c1a6a21e753d5bf815d5fc0882dcd3e26eb602d0e2bba20e3325c011f2059e0905056a470649213636384b3a3c24e3072d9
-
SSDEEP
24576:FELIY5NptnDrpcDRZ5Og7Cft6wM0JgxWUDWw5Rpr2:FE/jnD9gr5OgmfGqg4UDtt2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.a57d5fe647546ad9768a224f5865dd80.exe
Files
-
NEAS.a57d5fe647546ad9768a224f5865dd80.exe.exe windows:4 windows x86
b0d556e6fced10073d36709d8fe6ba14
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
GetVersionExA
GetVersion
GetPrivateProfileStringA
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
GetDriveTypeA
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
MoveFileA
DeleteFileA
RtlUnwind
SetEnvironmentVariableA
CreateDirectoryA
HeapFree
HeapAlloc
HeapCompact
TerminateProcess
ExitProcess
GetCurrentProcess
MoveFileExA
FormatMessageA
SetFileTime
WritePrivateProfileStringA
OpenFile
GetFileAttributesA
SetFileAttributesA
SetErrorMode
GetLocalTime
GetFullPathNameA
MultiByteToWideChar
WideCharToMultiByte
GetTempPathA
GetShortPathNameA
GetExitCodeProcess
GetCurrentDirectoryA
SetCurrentDirectoryA
CreateProcessA
Sleep
lstrcatA
lstrlenA
WinExec
LoadLibraryA
GetProcAddress
FreeLibrary
GetDiskFreeSpaceA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
CloseHandle
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetLastError
FindFirstFileA
FindClose
GetWindowsDirectoryA
LCMapStringA
GetSystemDirectoryA
user32
DialogBoxParamA
ExitWindowsEx
IsIconic
PostQuitMessage
DefWindowProcA
AdjustWindowRectEx
BringWindowToTop
EndDialog
IsDlgButtonChecked
CheckDlgButton
SetTimer
GetDlgItemTextA
SendDlgItemMessageA
GetLastActivePopup
RegisterClassA
LoadCursorA
LoadIconA
PostMessageA
GetWindow
SendMessageA
GetSysColor
ScreenToClient
GetWindowRect
GetDlgItem
EndPaint
BeginPaint
GetClientRect
FillRect
CheckRadioButton
SetFocus
GetParent
UpdateWindow
IsWindowVisible
InvalidateRect
CreateDialogParamA
RedrawWindow
PeekMessageA
GetMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
SetDlgItemTextA
SetWindowTextA
SetWindowPos
ShowWindow
DestroyWindow
CreateWindowExA
GetWindowLongA
IsWindowEnabled
CallWindowProcA
ValidateRect
SetWindowLongA
GetClassNameA
MessageBoxA
EnableWindow
SendMessageTimeoutA
wsprintfA
GetSystemMetrics
DrawTextA
FindWindowA
gdi32
CreatePalette
SetBkColor
ExtTextOutA
CreateFontIndirectA
GetSystemPaletteEntries
SetBkMode
AddFontResourceA
RemoveFontResourceA
GetStockObject
GetDeviceCaps
DeleteDC
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
RealizePalette
SelectPalette
CreateHalftonePalette
CreateDIBPatternBrush
CreateSolidBrush
SetBrushOrgEx
SetTextColor
StretchDIBits
SetStretchBltMode
advapi32
RegDeleteValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyExA
RegCreateKeyA
RegCloseKey
RegOpenKeyA
RegSetValueExA
RegQueryValueA
RegOpenKeyExA
RegQueryValueExA
shell32
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
ole32
OleInitialize
CoCreateInstance
CoGetMalloc
OleUninitialize
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
VerFindFileA
comctl32
ord17
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ