Static task
static1
Behavioral task
behavioral1
Sample
NEAS.030e4c3d7c3856730e8454f3970f6560.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.030e4c3d7c3856730e8454f3970f6560.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.030e4c3d7c3856730e8454f3970f6560.exe
-
Size
35KB
-
MD5
030e4c3d7c3856730e8454f3970f6560
-
SHA1
cda990287a9975d9896940549744822aaa90be09
-
SHA256
e151bbb7e9e23af2bef36f037d860df6e2ccce0a6c44c48a04f2e9f3e8376005
-
SHA512
2abc677a3996beb57d99ce325b33c3a70bbb83942e649f914bdc4d6aa64040959c7c9012415650c1da3489a81438718976692850af019d605465497f815ec383
-
SSDEEP
384:6nLj80kaKS5DUpqIox5qIS7E3P57H9+k05vqSApDecRkiU8tC88oyRKYyUP2X:cLjRl5ApI7OE5Sc+Rt49UP+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.030e4c3d7c3856730e8454f3970f6560.exe
Files
-
NEAS.030e4c3d7c3856730e8454f3970f6560.exe.exe windows:5 windows x86 arch:x86
c585d9b7637cb43fc6a3b820441b7ebb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDC
ReleaseDC
CreateCursor
DestroyCursor
ShowCursor
AppendMenuA
DrawTextExA
CharUpperA
CreateAcceleratorTableA
DrawEdge
GetClientRect
RegisterWindowMessageA
MoveWindow
DragDetect
GetCapture
CreateDialogIndirectParamA
ReleaseCapture
FindWindowA
kernel32
lstrlen
SetLastError
GetCommandLineA
GetStartupInfoA
ExitProcess
HeapFree
GetModuleHandleA
lstrlenA
MapViewOfFile
HeapDestroy
MultiByteToWideChar
CreateDirectoryA
ole32
CoInitialize
CoUninitialize
CoCreateInstanceEx
oleaut32
SysAllocStringLen
SysFreeString
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ