Behavioral task
behavioral1
Sample
NEAS.c07566587c94ef5b73dd7394047c0d10.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.c07566587c94ef5b73dd7394047c0d10.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.c07566587c94ef5b73dd7394047c0d10.exe
-
Size
97KB
-
MD5
c07566587c94ef5b73dd7394047c0d10
-
SHA1
b5f61990ae0f6fc19987286c52a930b56eb03e1e
-
SHA256
bb5dce573570dd12f81fbe419ac7d0b316b1ad18a356fa861b37df51598deca8
-
SHA512
4e2a69c3f7cfc58078efa5999a1d6e1c99a1fd42f957033530a1d52b2eef07d76ec5eba371fb6cb856e41ae5a71202737a3eefe1d8452ca984b972928ee76400
-
SSDEEP
1536:X9B7Xvw5JqR15sjoC9XbQ2eHTqshEHxOjWLEH33gVJGufiDBGX4d4PNkrFFXJlb:X7H1ujx5QzKOjWLEX3grkfONkP5lb
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.c07566587c94ef5b73dd7394047c0d10.exe
Files
-
NEAS.c07566587c94ef5b73dd7394047c0d10.exe.exe windows:4 windows x86
8cccc7d9460432494eb613c3e864894f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualProtect
ExitProcess
advapi32
RegCloseKey
comctl32
ord17
comdlg32
GetFileTitleA
gdi32
Escape
imagehlp
MakeSureDirectoryPathExists
ole32
OleInitialize
oleaut32
SysAllocStringLen
oledlg
ord8
olepro32
ord253
user32
GetDC
wininet
InternetOpenA
winspool.drv
ClosePrinter
dui70
?Register@Macro@DirectUI@@SAJXZ
Sections
dgbwqbp Size: - Virtual size: 144KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 90KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�ŵ����� Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.l1 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE