Static task
static1
Behavioral task
behavioral1
Sample
NEAS.33a38e3b606bfd8a5c0048a2b9337a60.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.33a38e3b606bfd8a5c0048a2b9337a60.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.33a38e3b606bfd8a5c0048a2b9337a60.exe
-
Size
56KB
-
MD5
33a38e3b606bfd8a5c0048a2b9337a60
-
SHA1
3913c8e65e5a0d5fdebb6f9001610237d67e84c5
-
SHA256
8a9f2ee11f084f83d18580a66e31bef0504f412e985acf8dbc4a2d1184e9d624
-
SHA512
72fe66272f6690ba436d511f8a99365597eeac77280a62f56b61202d977d2ec0f6e797da27893029d2c9c7f269761a8dc5cfda7366459dbe5f48636810a70b26
-
SSDEEP
768:N7nkhCphZkSwprRN8tdhin4ak/4LojJRisR5bGJEY8ogXKCC6FQxB:XpbQrTCaU4miBEZoa8y4B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.33a38e3b606bfd8a5c0048a2b9337a60.exe
Files
-
NEAS.33a38e3b606bfd8a5c0048a2b9337a60.exe.exe windows:4 windows x86 arch:x86
5bbc2cceab2327de01fb548ec83bda7b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
GetLogicalDrives
GetSystemDirectoryA
WaitForSingleObject
CreateProcessA
TerminateProcess
GetExitCodeProcess
ReadFile
FindClose
FindNextFileA
FindFirstFileA
GetVersionExA
GlobalMemoryStatus
Beep
GetLogicalDriveStringsA
CreateThread
GetVolumeInformationA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetLastError
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
VirtualFreeEx
OpenProcess
GetModuleHandleA
SetStdHandle
LoadLibraryA
GetProcAddress
GetPrivateProfileStringA
GetFileSize
DeleteFileA
SetFilePointer
CreateFileA
WriteFile
CloseHandle
GetVersion
GetCurrentProcess
WinExec
ExitProcess
GetCurrentThreadId
GetModuleFileNameA
GetWindowsDirectoryA
Sleep
SetFileAttributesA
CopyFileA
GetLocalTime
HeapReAlloc
VirtualAlloc
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
RtlUnwind
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetStartupInfoA
GetCommandLineA
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
FlushFileBuffers
user32
PostThreadMessageA
ExitWindowsEx
MessageBoxA
advapi32
ControlService
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegisterServiceCtrlHandlerA
DeleteService
CreateServiceA
ChangeServiceConfig2A
StartServiceA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
SetServiceStatus
StartServiceCtrlDispatcherA
ws2_32
WSASocketA
bind
listen
accept
inet_addr
gethostname
htons
gethostbyname
connect
send
recv
closesocket
setsockopt
WSACleanup
WSAStartup
socket
shlwapi
PathFileExistsA
Sections
.text Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE