c:\Users\admin\Desktop\NEW\obfuscate1\src\windows\release\test.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b644fc74839b0cf486679150a0c93df0_NEAS.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b644fc74839b0cf486679150a0c93df0_NEAS.exe
Resource
win10v2004-20240426-en
General
-
Target
b644fc74839b0cf486679150a0c93df0_NEAS
-
Size
1.3MB
-
MD5
b644fc74839b0cf486679150a0c93df0
-
SHA1
cdcee05ea1fc76869d11054be65b13b1e0404b2e
-
SHA256
860bc44daa375d80f1a27e385fba4fd9100e492ec8eee4d81d5b165007c0082f
-
SHA512
565454fc085aeb6ab48f47a47b17a01441dae1d9cb187240450a7f9544f04b93ae2c17a020e5c057d29f12218289dc247bb8f5f62c5a2db4c656ef49d8c88a4c
-
SSDEEP
24576:2xQS2vXmx+prBRow1DwiKs7KCb8SGEC6H/AGCTT7QTXEyc/aErS:AQSemxarBCTiKsXb4n64BTT7QLZWlS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b644fc74839b0cf486679150a0c93df0_NEAS
Files
-
b644fc74839b0cf486679150a0c93df0_NEAS.exe windows:4 windows
eee9fa3e8317ddec8755ed2d5baa9a5e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ExitProcess
GetCommandLineW
LocalFree
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
GetProcAddress
GetModuleHandleA
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
LoadLibraryA
InitializeCriticalSection
GetCPInfo
GetACP
GetOEMCP
Sleep
VirtualAlloc
HeapReAlloc
RtlUnwind
HeapSize
MultiByteToWideChar
GetLocaleInfoA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
TranslateAcceleratorA
LoadAcceleratorsA
DispatchMessageA
TranslateMessage
GetMessageA
shell32
CommandLineToArgvW
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.d Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 552B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ