Static task
static1
Behavioral task
behavioral1
Sample
5eb397bc0e8811708b59a1cbcaf89ca0_NEAS.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5eb397bc0e8811708b59a1cbcaf89ca0_NEAS.exe
Resource
win10v2004-20240419-en
General
-
Target
5eb397bc0e8811708b59a1cbcaf89ca0_NEAS
-
Size
28KB
-
MD5
5eb397bc0e8811708b59a1cbcaf89ca0
-
SHA1
cf4aee6d5072ab041a47a1765ff824afe2db939f
-
SHA256
e989f8262cd07203ec350c90e0853f568066b188a730f789ad5de364f1039861
-
SHA512
718a05616fd8a2fa9a07124ac9a70df54902221ae9ab2cc3bda0c256de0d95f987620a2ac16b061eeb9e6d301e9c19c440e14f57a0639440026d094d93a3f861
-
SSDEEP
384:zFtY8ID4TQOdjAkyu3bGAJkl/99sQ4E9:zD2D4TJ6u3bGAkl/9WTE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5eb397bc0e8811708b59a1cbcaf89ca0_NEAS
Files
-
5eb397bc0e8811708b59a1cbcaf89ca0_NEAS.exe windows:4 windows x86 arch:x86
5bb7bc6241461a7786081e54cfb41dba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
_CIcos
_adj_fptan
__vbaFreeVar
__vbaStrVarMove
__vbaFreeVarList
__vbaEnd
_adj_fdiv_m64
__vbaFreeObjList
_adj_fprem1
__vbaStrCat
__vbaHresultCheckObj
_adj_fdiv_m32
__vbaOnError
__vbaObjSet
_adj_fdiv_m16i
__vbaObjSetAddref
_adj_fdivr_m16i
ord598
_CIsin
__vbaChkstk
EVENT_SINK_AddRef
ord560
__vbaI2I4
_adj_fpatan
EVENT_SINK_Release
__vbaNew
ord600
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
_adj_fprem
_adj_fdivr_m64
__vbaFPException
__vbaVarCat
ord535
_CIlog
__vbaErrorOverflow
__vbaNew2
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
__vbaFreeStrList
_adj_fdivr_m32
_adj_fdiv_r
ord100
__vbaVarDup
_CIatan
__vbaStrMove
__vbaCastObj
_allmul
_CItan
_CIexp
__vbaFreeStr
__vbaFreeObj
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ