D:\dbs\sh\ddvsm\0128_230433\cmd\4o\out\binaries\x86ret\bin\i386\VsRegEdit.pdb
Static task
static1
Behavioral task
behavioral1
Sample
538b7bc6b746a684f20a3344f10ba870_NEAS.exe
Resource
win7-20240220-en
General
-
Target
538b7bc6b746a684f20a3344f10ba870_NEAS
-
Size
768KB
-
MD5
538b7bc6b746a684f20a3344f10ba870
-
SHA1
e36daa7d0d034f3edbc136c0bf07a1d3e96d0a67
-
SHA256
e3f6f79423765f269343fe1d8e983b9c0d136b1dfa28374dd5bc45221fb32199
-
SHA512
8abaef1a8f9866682c2cb2aaea5bb0b7aeb743a0fb249b22ec365ea959c2d6c1c6f8cba9535d6c8e8a2810e33c2c5694d24e625cea12e09c4c2154fabc39e396
-
SSDEEP
12288:Tmcp6SiWGPCcjuPsyjCKT8UNU1FBtfcPKcOYRLbzQkbL+Qg+H5oeIj5RLLB+lOaW:vEWc9cPs8S+LbzQkWWbCzLLB+lMP1NFd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 538b7bc6b746a684f20a3344f10ba870_NEAS
Files
-
538b7bc6b746a684f20a3344f10ba870_NEAS.exe windows:6 windows x86 arch:x86
c76d36aa350b124608209cd41a5973e6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegQueryValueExW
RegEnumValueW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegEnumKeyExW
RegCreateKeyExW
RegDeleteKeyW
RegQueryInfoKeyW
RegCloseKey
CheckTokenMembership
AllocateAndInitializeSid
RegQueryInfoKeyA
RegEnumValueA
RegEnumKeyExA
RegDeleteTreeA
RegDeleteKeyValueW
RegDeleteKeyValueA
RegDeleteValueA
RegDeleteKeyExW
RegDeleteKeyExA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegLoadAppKeyW
RegDeleteTreeW
RegSaveKeyW
RegGetKeySecurity
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
RevertToSelf
ImpersonateLoggedOnUser
FreeSid
kernel32
VirtualFree
VirtualAlloc
FlushInstructionCache
SetThreadContext
GetThreadContext
ResumeThread
SuspendThread
VirtualQuery
FindResourceW
LoadResource
FindResourceExW
LockResource
FindClose
FindFirstFileW
SizeofResource
GetModuleHandleW
GetProcessHeap
DeleteCriticalSection
GetProcAddress
HeapDestroy
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionEx
GetModuleFileNameW
HeapFree
VirtualProtect
CreateDirectoryW
GetFileAttributesW
MoveFileW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
RtlUnwind
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetStdHandle
WriteFile
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetACP
CompareStringW
LCMapStringW
GetFileType
GetStringTypeW
GetCurrentThread
OutputDebugStringW
CloseHandle
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
CreateFileW
CreateMutexW
ReleaseMutex
WaitForSingleObject
LoadLibraryW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
FlushViewOfFile
GetTickCount
Sleep
GetFileAttributesExW
GetPrivateProfileStringW
VerSetConditionMask
VerifyVersionInfoW
CompareStringA
InitializeCriticalSection
CreateToolhelp32Snapshot
Thread32First
OpenThread
Thread32Next
HeapUnlock
GetVersionExW
HeapLock
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryEnterCriticalSection
shell32
SHGetFolderPathW
ole32
StringFromGUID2
CoTaskMemFree
CLSIDFromString
CoCreateGuid
StringFromCLSID
oleaut32
SysFreeString
SysAllocString
shlwapi
PathRemoveBackslashW
PathIsRootW
PathCombineW
PathRemoveFileSpecW
StrCmpIW
PathFileExistsW
PathAppendW
Sections
.text Size: 176KB - Virtual size: 175KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 576KB - Virtual size: 580KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE