t:\projects\exavk\release\exavk.pdb
Static task
static1
Behavioral task
behavioral1
Sample
65025838375bb7c3f093dcb0b3c0cb40_NEAS.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
65025838375bb7c3f093dcb0b3c0cb40_NEAS.exe
Resource
win10v2004-20240419-en
General
-
Target
65025838375bb7c3f093dcb0b3c0cb40_NEAS
-
Size
11KB
-
MD5
65025838375bb7c3f093dcb0b3c0cb40
-
SHA1
790f7943fc5cbf410c17c19a87a0859ea3953959
-
SHA256
6b91bab49107ddfccb5ca205f9085e1589caa4028ab05e0079590551cea92b6d
-
SHA512
5404ff5c768a7f3f21b3a4aba1b8f44592c47f0074149efb43155e28b370e86ba6c9314841271f49182060d3781741dd26b2cfe4a28e79cb097ecb3d967d9512
-
SSDEEP
192:icEF+XG/XE2erf9u929U/9sIQJf1WMhfb1fjNSNx2cKZNJARCMAu6CkqdOlf0:iZFQaXE2eC/9s9JfU0T1Hhu6Xs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 65025838375bb7c3f093dcb0b3c0cb40_NEAS
Files
-
65025838375bb7c3f093dcb0b3c0cb40_NEAS.exe windows:4 windows x86 arch:x86
4702c385412889c1f25838be0048a2ee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcp80
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?find_last_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
msvcr80
__initenv
_initterm
_initterm_e
_XcptFilter
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_vsnprintf
_crt_debugger_hook
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
_exit
_cexit
__getmainargs
_amsg_exit
exit
_errno
strerror
??2@YAPAXI@Z
??3@YAXPAX@Z
fprintf
??_V@YAXPAX@Z
__iob_func
_configthreadlocale
_read
_close
_lseek
_open
_write
__CxxFrameHandler3
memset
kernel32
Sleep
InterlockedCompareExchange
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
InterlockedExchange
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 916B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ