Static task
static1
Behavioral task
behavioral1
Sample
1a565cfdeb437e3f83031fd22117c330_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1a565cfdeb437e3f83031fd22117c330_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
1a565cfdeb437e3f83031fd22117c330_NEIKI
-
Size
196KB
-
MD5
1a565cfdeb437e3f83031fd22117c330
-
SHA1
63ed399015f183e0595644eee1690ea9e8f7612f
-
SHA256
22eb40311002e066e9a2897676ddba518a81488e086109d4d55b895078a83952
-
SHA512
5da132ed47ca8d40837b07cf09b780000dd2bbbff4c6f9367b148b3a94f0824f6c6447d7c26b32dfeaa38d27268ef821c2d33dd2494903bc8886059e9b3b856f
-
SSDEEP
6144:ETC6zXNUS1vufPfy3DevqBZCeFlHa5kEPNNy8X:EJzXNUS1vufPfy3DevqHrlHa5N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1a565cfdeb437e3f83031fd22117c330_NEIKI
Files
-
1a565cfdeb437e3f83031fd22117c330_NEIKI.exe windows:4 windows x86 arch:x86
3f0d5ddfc76d0e614ae047198c83c048
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
SetTokenInformation
kernel32
AddAtomA
AllocConsole
CloseHandle
CreateDirectoryA
CreateSemaphoreA
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExitProcess
FindAtomA
FindClose
FindFirstFileA
FormatMessageA
FreeLibrary
GetAtomNameA
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetSystemInfo
GetVersionExA
GlobalMemoryStatus
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
LocalFree
MultiByteToWideChar
ReleaseSemaphore
SetCurrentDirectoryA
SetDllDirectoryA
SetErrorMode
SetLastError
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
msvcrt
_itoa
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_access
_assert
_cexit
_errno
_fullpath
_iob
_onexit
_setmode
_snprintf
abort
atexit
atoi
calloc
fclose
fgets
fopen
fprintf
fputc
free
fwrite
getenv
localeconv
malloc
memchr
memcpy
memmove
memset
setlocale
signal
strchr
strcmp
strcpy
strlen
strncat
strncmp
strncpy
strrchr
strstr
strtoul
vfprintf
wcslen
shell32
SHGetFolderPathA
user32
MessageBoxA
Sections
.text Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 18KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zero Size: 4KB - Virtual size: 3KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ