Static task
static1
General
-
Target
NEAS.20f54d45e2a8b035575ed9d54b9eb960.exe
-
Size
9KB
-
MD5
20f54d45e2a8b035575ed9d54b9eb960
-
SHA1
877badf785f0b3fe396e8128d1a2a030308b6fdd
-
SHA256
489584a8eb7c93a636b513ecd9c403a43af2ea3923a18d61b27456b10de21d21
-
SHA512
e195dc3ec53e45912c7f4b9d93b8d497a0edad608d1225edfc627dd7132018b7564f25771ca05c29fc8ec357bb4dbf74066daca0f19d869e641518d4b2fd6d4f
-
SSDEEP
96:2TrSm5em98kL4ofL2E4wod1eCtirSHWj7TEGMkoBiS525hjo:2T1kmekLvfL2E4vTeCtQYcHmiSU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.20f54d45e2a8b035575ed9d54b9eb960.exe
Files
-
NEAS.20f54d45e2a8b035575ed9d54b9eb960.exe.sys windows:10 windows x64 arch:x64
48aab8b485505e39221c6ac40909a9cb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntoskrnl.exe
RtlInitUnicodeString
RtlGetVersion
ExAllocatePool
ExFreePoolWithTag
MmUnmapIoSpace
MmMapIoSpaceEx
IofCompleteRequest
IoCreateDevice
IoCreateSymbolicLink
IoDeleteDevice
IoDeleteSymbolicLink
ObfDereferenceObject
MmCopyMemory
PsLookupProcessByProcessId
IoCreateDriver
PsGetProcessSectionBaseAddress
ZwQuerySystemInformation
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 264B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 1024B - Virtual size: 568B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ