Static task
static1
Behavioral task
behavioral1
Sample
NEAS.36f8d2adf2923b5a5ca5a8c345adc910.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.36f8d2adf2923b5a5ca5a8c345adc910.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.36f8d2adf2923b5a5ca5a8c345adc910.exe
-
Size
3.4MB
-
MD5
36f8d2adf2923b5a5ca5a8c345adc910
-
SHA1
03f0eb9a977882ab03087e0e8481270404fe4546
-
SHA256
25938b2deec10a53b583aa5ccc5b4b4374f5e7c9bf0fb051afed580c091a5931
-
SHA512
dec4f612ee03f0ca4066bb195b2b76c2d7c1435b9804ad0a9dcecf765ddea1df85c65559e33d0687a3a9e8f40bdcf098d0c594dfaa8996343c6181e4095a5bd2
-
SSDEEP
49152:lRMIcIejYfOeWC9w8Rv7ZWFSLDPBp+83Lwl8MImhNNCsW3:AFX8R9WFSLDPRbizhNNCsW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.36f8d2adf2923b5a5ca5a8c345adc910.exe
Files
-
NEAS.36f8d2adf2923b5a5ca5a8c345adc910.exe.exe windows:4 windows x86 arch:x86
f5baa8da58a8e6ffcd82e92d2f78f07f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
RegCreateKeyExW
RegCreateKeyW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegOpenKeyExW
RegOpenKeyW
RegQueryValueExW
RegSetValueExW
gdi32
DeleteObject
kernel32
AddAtomA
CloseHandle
CompareFileTime
CreateDirectoryW
CreateEventA
CreateEventW
CreateFileW
CreatePipe
CreateProcessA
CreateProcessW
CreateSemaphoreA
CreateSemaphoreW
DeleteCriticalSection
DeleteFileW
DosDateTimeToFileTime
DuplicateHandle
EnterCriticalSection
ExitProcess
FileTimeToDosDateTime
FileTimeToSystemTime
FindAtomA
FindClose
FindCloseChangeNotification
FindFirstChangeNotificationW
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FormatMessageA
FormatMessageW
FreeLibrary
GetAtomNameA
GetCommandLineW
GetConsoleTitleW
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDriveTypeA
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesW
GetFileInformationByHandle
GetFileSize
GetFullPathNameW
GetLastError
GetLogicalDriveStringsW
GetLogicalDrives
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetProcessTimes
GetProcessWorkingSetSize
GetShortPathNameW
GetStartupInfoW
GetStdHandle
GetSystemDirectoryW
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathW
GetThreadPriority
GetThreadTimes
GetTickCount
GetVersionExA
GetWindowsDirectoryW
GlobalMemoryStatus
GlobalMemoryStatusEx
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LocalFree
MoveFileW
MultiByteToWideChar
OpenThread
OutputDebugStringA
PulseEvent
QueryPerformanceCounter
QueryPerformanceFrequency
ReadFile
ReleaseSemaphore
RemoveDirectoryW
ResetEvent
SearchPathW
SetConsoleCtrlHandler
SetConsoleTitleW
SetEndOfFile
SetEvent
SetFileAttributesW
SetFilePointer
SetFileTime
SetLastError
SetThreadPriority
SetUnhandledExceptionFilter
Sleep
SystemTimeToFileTime
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtect
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrlenW
msvcrt
_close
_getch
_getpid
_isatty
_mkdir
_read
_setmode
_stat
_strdup
_stricmp
_strlwr
_write
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_assert
_atoi64
_beginthreadex
_cexit
_chsize
_close
_endthreadex
_errno
_filbuf
_filelengthi64
_findclose
_fmode
_fpreset
_fstati64
_get_osfhandle
_iob
_isctype
_lrotr
_lseeki64
_onexit
_open_osfhandle
_pclose
_pctype
_popen
_read
_setjmp
_setmode
_sopen
_stati64
_stricmp
_telli64
_timezone
_tzname
_waccess
_wchmod
_wcreat
_wfindfirsti64
_wfindnexti64
_wmkdir
_wopen
_wremove
_wrename
_write
_wrmdir
_wstati64
_wunlink
abort
acos
asin
atan
atan2
atexit
atof
atoi
bsearch
calloc
ceil
clearerr
clock
cos
cosh
ctime
difftime
exit
exp
fclose
fflush
fgets
floor
fmod
fopen
fprintf
fputc
fputs
fread
free
frexp
fscanf
fseek
ftell
fwrite
getenv
gmtime
ldexp
localeconv
localtime
log
log10
longjmp
malloc
memchr
memcpy
memmove
memset
mktime
modf
pow
printf
putchar
puts
qsort
raise
rand
realloc
remove
rename
setlocale
setvbuf
signal
sin
sinh
sprintf
sqrt
srand
sscanf
strcat
strchr
strcmp
strcoll
strcpy
strcspn
strerror
strftime
strlen
strncat
strncmp
strncpy
strpbrk
strrchr
strstr
strtod
strtol
strtoul
system
tan
tanh
time
tmpfile
tmpnam
tolower
toupper
ungetc
vfprintf
wcschr
wcscmp
wcscpy
wcslen
wcsrchr
ole32
CoInitializeEx
oleaut32
SysAllocString
SysAllocStringByteLen
SysStringByteLen
VariantClear
VariantCopy
shell32
CommandLineToArgvW
SHGetFolderPathW
ShellExecuteExW
user32
CharToOemBuffA
CharToOemBuffW
CharToOemW
CharUpperW
ExitWindowsEx
GetActiveWindow
GetCapture
GetCaretPos
GetClipboardOwner
GetClipboardViewer
GetCursorPos
GetDesktopWindow
GetFocus
GetInputState
GetMessagePos
GetMessageTime
GetOpenClipboardWindow
GetProcessWindowStation
MessageBoxA
OemToCharBuffA
OemToCharBuffW
OemToCharW
wsock32
closesocket
recv
send
Sections
.text Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 181KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rodata Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 169KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 256KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE