Static task
static1
Behavioral task
behavioral1
Sample
69b9c3b8b5bc127d925fe209ad67b3a0_NEIKI.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
69b9c3b8b5bc127d925fe209ad67b3a0_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
69b9c3b8b5bc127d925fe209ad67b3a0_NEIKI
-
Size
1016KB
-
MD5
69b9c3b8b5bc127d925fe209ad67b3a0
-
SHA1
264bbc165cdef8c0d5d966c5f403bd4fd3b047b9
-
SHA256
869c1303a4afc9a11f2e173b4be93f95e59d30cd00dd7378ed30d44624058877
-
SHA512
eb3709916f3e734f67a1eab0d8f44fbe843cba21c6b258fb7df054905fa2b6cf3268ff8039eb97a7d49e1532a2402d2a696b9daf0b1316fb7051d8104d1bba1e
-
SSDEEP
24576:TUXuh/FDwDUJ2TTTTKlJSyYBv+ux4XatZqkvsKgvhixrk1JS:THFDTEDKvnFA4qtPp0JS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 69b9c3b8b5bc127d925fe209ad67b3a0_NEIKI
Files
-
69b9c3b8b5bc127d925fe209ad67b3a0_NEIKI.exe windows:4 windows x86 arch:x86
4ebc77aca7f19ab94b28e538eae69019
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
FlushFileBuffers
CreateProcessA
CompareStringW
SetEnvironmentVariableA
GetStringTypeA
GetStringTypeW
GetLocaleInfoW
GetCurrentDirectoryW
DeleteFileA
WaitForSingleObject
CompareStringA
GetExitCodeProcess
IsValidCodePage
IsValidLocale
GetCPInfo
LCMapStringW
LCMapStringA
MultiByteToWideChar
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapFree
HeapSize
HeapAlloc
HeapReAlloc
WideCharToMultiByte
GetVersion
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetOEMCP
GetTickCount
Sleep
GetCurrentDirectoryA
CloseHandle
SetEndOfFile
SetFilePointer
CompareFileTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
SystemTimeToFileTime
GetLocalTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
SetFileTime
WriteFile
GetACP
ReadFile
GetFileSize
GetLastError
LocalFree
GetFullPathNameW
GetFullPathNameA
GetTempPathW
GetModuleFileNameW
MoveFileW
CopyFileW
DeleteFileW
GetFileAttributesW
CreateDirectoryW
SetCurrentDirectoryW
SetCurrentDirectoryA
SetFileAttributesW
GetFileTime
GetTimeZoneInformation
CreateFileW
MoveFileA
CopyFileA
GetFileAttributesA
FormatMessageA
GetTempPathA
GetModuleFileNameA
CreateDirectoryA
SetFileAttributesA
CreateFileA
GetVersionExA
GetProcAddress
LoadLibraryA
LocalAlloc
FreeLibrary
RtlUnwind
ExitProcess
TerminateProcess
GetCurrentProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
user32
RegisterClassExW
LoadCursorA
DialogBoxParamW
CreateWindowExW
SetWindowPos
OffsetRect
LoadStringW
GetMessageA
DispatchMessageA
MessageBoxA
GetDlgItem
SendMessageA
TranslateMessage
PostMessageA
SetTimer
GetDlgItemTextA
LoadStringA
DefWindowProcA
DestroyWindow
BeginPaint
EndPaint
GetDlgItemTextW
SetWindowTextW
MoveWindow
SetDlgItemTextW
EnableWindow
SetDlgItemTextA
EndDialog
PostQuitMessage
MessageBoxW
GetDesktopWindow
GetWindowRect
CopyRect
shell32
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetMalloc
ShellExecuteExW
crypt32
CertNameToStrA
CertFreeCertificateContext
CryptDecodeObject
CertCloseStore
ws2_32
WSAGetLastError
socket
inet_addr
htons
setsockopt
gethostbyname
connect
WSAStartup
ioctlsocket
select
bind
closesocket
shutdown
send
recv
wininet
InternetCombineUrlA
advapi32
RegOpenKeyExA
CryptAcquireContextA
CryptReleaseContext
GetUserNameA
RegQueryValueExA
RegCloseKey
CryptGenRandom
oleaut32
SysFreeString
SysAllocString
SysStringLen
Sections
.text Size: 472KB - Virtual size: 468KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ