Static task
static1
Behavioral task
behavioral1
Sample
NEAS.e506684fab612c0dfdd5659d80cc7da0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.e506684fab612c0dfdd5659d80cc7da0.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.e506684fab612c0dfdd5659d80cc7da0.exe
-
Size
796KB
-
MD5
e506684fab612c0dfdd5659d80cc7da0
-
SHA1
4504764e1cb203c4f7b888b708f3eb73c983f679
-
SHA256
2fe69d4e22431766cb0b3bba3d5390cb29bc780710469a022a2bb3af0ae4696d
-
SHA512
8bb81537b56d628dfd413d5993cdcead9a34af528b0e5e79577863b7f32a623f1f6ce243481c0e98933951d887f43a60edb4a674148bcfa14eb220a4b61f7e3d
-
SSDEEP
6144:RgQh8g8Cfgyg8tgskJveZugg3S1TEETge+WH1rFgS+uyrayUUvR4o:9Adt/SFEW+WHc/T54o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.e506684fab612c0dfdd5659d80cc7da0.exe
Files
-
NEAS.e506684fab612c0dfdd5659d80cc7da0.exe.exe windows:5 windows x86 arch:x86
7f1e8c50552257546de8ad78492708ce
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__set_app_type
__p__fmode
__p__commode
_controlfp
memset
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_except_handler3
comctl32
ImageList_Add
ImageList_BeginDrag
ImageList_Copy
ImageList_Create
FlatSB_SetScrollProp
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragMove
ImageList_DragShowNolock
ImageList_DrawEx
ImageList_EndDrag
ImageList_GetBkColor
ImageList_GetDragImage
ImageList_GetIconSize
ImageList_GetImageCount
ImageList_GetImageInfo
ImageList_LoadImageW
ImageList_Read
ImageList_Remove
ImageList_Replace
ImageList_ReplaceIcon
ImageList_SetBkColor
ImageList_SetIconSize
ImageList_SetImageCount
ImageList_SetOverlayImage
ImageList_Write
ord17
FlatSB_SetScrollPos
FlatSB_SetScrollInfo
ImageList_Destroy
version
VerQueryValueW
GetFileVersionInfoW
kernel32
CreateEventW
IsValidCodePage
InitializeCriticalSection
EnterCriticalSection
GetTickCount
LeaveCriticalSection
LoadLibraryA
CreateDirectoryW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetStartupInfoA
CopyFileW
ConnectNamedPipe
GetCommandLineA
ExitProcess
user32
CharLowerBuffW
CharLowerA
CallWindowProcW
GetSysColor
GetKeyState
CallNextHookEx
gdi32
BeginPath
EndPath
BitBlt
winspool.drv
EnumPrintersW
OpenPrinterW
advapi32
RegLoadKeyW
RegFlushKey
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegDeleteKeyA
RegCreateKeyExW
RegOpenKeyExA
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExA
RegQueryValueExW
RegQueryValueW
RegReplaceKeyW
RegRestoreKeyW
RegSaveKeyW
RegSetValueExA
RegUnLoadKeyW
SetSecurityDescriptorDacl
RegSetValueExW
ole32
OleInitialize
StringFromCLSID
CoTaskMemFree
CoTaskMemAlloc
StringFromGUID2
CoUninitialize
OleUninitialize
oleaut32
SafeArrayAllocDescriptor
SetErrorInfo
SafeArrayUnaccessData
SafeArrayRedim
SafeArrayPutElement
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElement
SafeArrayDestroyDescriptor
SafeArrayDestroy
SafeArrayCreate
SafeArrayCopy
VariantInit
VariantCopyInd
VariantClear
VariantChangeType
UnRegisterTypeLi
SysStringLen
SysReAllocStringLen
SysFreeString
GetErrorInfo
SafeArrayAllocData
SysAllocStringLen
Sections
.text Size: 424KB - Virtual size: 422KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 4KB - Virtual size: 648B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ifx Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 352KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ