Static task
static1
Behavioral task
behavioral1
Sample
0dcb4c3fd05ab51d33e5f9b07b130f10_NEAS.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0dcb4c3fd05ab51d33e5f9b07b130f10_NEAS.exe
Resource
win10v2004-20240419-en
General
-
Target
0dcb4c3fd05ab51d33e5f9b07b130f10_NEAS
-
Size
213KB
-
MD5
0dcb4c3fd05ab51d33e5f9b07b130f10
-
SHA1
494912cb4229869ff5276a0825ccb815ef857937
-
SHA256
7cad18edd2e6f17663f66963381a6100eea18f26a53d06d790377788bf692a72
-
SHA512
d31093c54d5463b13ba57f8739222313d1d96764f4ee515d0a5b7bafdef0e37fb936e5c6ff4dc762352816d4c9913712c0d9dbb3afa37409361a6884b7db4f46
-
SSDEEP
6144:P7++Jbojf5Vq5OC4qZhZcKYhc/ZfUozY:a+cff22qZhZcKYhc/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0dcb4c3fd05ab51d33e5f9b07b130f10_NEAS
Files
-
0dcb4c3fd05ab51d33e5f9b07b130f10_NEAS.exe windows:4 windows x86 arch:x86
98aa7065495f35513795744857924eba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenFile
IsBadStringPtrW
CreateMailslotW
GetEnvironmentVariableA
GetWindowsDirectoryW
SetUnhandledExceptionFilter
lstrcpynW
GetTempPathW
GetLogicalDriveStringsA
ConnectNamedPipe
lstrcpyn
GetProcAddress
GetNumberFormatA
GetOEMCP
OpenMutexW
FileTimeToSystemTime
CreateEventW
GetModuleHandleA
CreateSemaphoreW
GetLongPathNameW
lstrcpy
SetCalendarInfoA
GetCommandLineW
DosDateTimeToFileTime
QueryPerformanceFrequency
FileTimeToLocalFileTime
user32
IsDlgButtonChecked
GetWindowTextA
GetWindowLongA
GetAsyncKeyState
GetActiveWindow
MonitorFromRect
GetMenuStringA
BringWindowToTop
CharUpperA
CheckMenuItem
GetActiveWindow
GetDlgItemTextW
GetParent
UpdateLayeredWindow
GetDCEx
GetMessageW
GetCursorPos
LoadMenuA
gdi32
SetArcDirection
ColorMatchToTarget
ExtFloodFill
LPtoDP
SetStretchBltMode
SetSystemPaletteUse
SetMiterLimit
ColorCorrectPalette
CopyEnhMetaFileW
SetWindowExtEx
ExtTextOutW
FillRgn
IntersectClipRect
CreateCompatibleDC
GetTextColor
SetViewportOrgEx
RestoreDC
PolylineTo
advapi32
RegReplaceKeyA
RegRestoreKeyA
RegDeleteValueA
RegEnumValueW
RegCreateKeyExA
shlwapi
UrlCombineA
comctl32
ImageList_SetFlags
wininet
SetUrlCacheEntryInfoA
winspool.drv
ConvertUnicodeDevModeToAnsiDevmode
EnumJobsA
AdvancedDocumentPropertiesW
SplDriverUnloadComplete
ExtDeviceMode
QuerySpoolMode
SetDefaultPrinterA
ConfigurePortA
GetPrinterDataExW
DeviceCapabilitiesA
wsock32
ntohs
dn_expand
rexec
getservbyport
GetNameByTypeA
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.WjTd Size: 1KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.H Size: 3KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Grrl Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Lx Size: 1KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.eB Size: 1KB - Virtual size: 269KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.htext Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE