Eula.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2c52ec5c49032ff66f1820f682250670_NEIKI.exe
Resource
win7-20240221-en
General
-
Target
2c52ec5c49032ff66f1820f682250670_NEIKI
-
Size
642KB
-
MD5
2c52ec5c49032ff66f1820f682250670
-
SHA1
7eadbc0becc44a468584eb0bf816d7feb94adc5b
-
SHA256
d5d3cd0732da3900f79c821bd10796cfb7fbd450d3306dad73a392f729b87a5e
-
SHA512
3e04a79a29522f5b674570014c713a82efb11fcd8edeedd5e780a4363f1854a9a98592c8a653ee8cc253937053c93fa82f499dd173683412511696511bdfabe6
-
SSDEEP
12288:3lyfcDKPo2f3p6UjKvDhFwOz0/QGoFiYldaFMi9nEE8h+9oRWk:3lwPoip66KfwOI4GofidEE8h+9o4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c52ec5c49032ff66f1820f682250670_NEIKI
Files
-
2c52ec5c49032ff66f1820f682250670_NEIKI.exe windows:5 windows x86 arch:x86
93e5f4af0ddc1affa0ec93d180e742ca
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrcatW
lstrlenW
lstrcpyW
FlushInstructionCache
GetCurrentProcess
LoadLibraryW
SetLastError
GetModuleFileNameW
OutputDebugStringA
GetCurrentThreadId
LoadLibraryA
GetPrivateProfileStringW
MultiByteToWideChar
lstrlenA
CopyFileW
LockResource
LoadResource
lstrcmpW
MulDiv
GlobalUnlock
GlobalLock
GlobalFree
GlobalHandle
GetPrivateProfileIntW
lstrcpynW
FindFirstFileW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
Sleep
InterlockedExchange
DecodePointer
EncodePointer
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
FindClose
FindResourceW
GlobalAlloc
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleA
RaiseException
GetVersion
GetFileAttributesW
GetProcAddress
GetModuleHandleW
GetFullPathNameW
user32
IsWindowEnabled
RedrawWindow
GetClientRect
SetWindowPos
MoveWindow
FillRect
SetWindowTextW
DefWindowProcW
DialogBoxIndirectParamW
GetClassInfoExW
RegisterClassExW
GetWindowLongW
SetWindowLongW
CreateWindowExW
GetWindowTextW
GetSysColor
EnableWindow
ScreenToClient
GetDC
ReleaseDC
InvalidateRect
InvalidateRgn
SetCapture
IsChild
GetParent
GetClassNameW
CharNextW
ReleaseCapture
GetActiveWindow
RegisterWindowMessageW
GetWindowTextLengthW
CreateAcceleratorTableW
LoadCursorW
DestroyAcceleratorTable
IsWindow
GetFocus
SetFocus
GetDesktopWindow
BeginPaint
EndPaint
CallWindowProcW
DestroyWindow
ClientToScreen
EndDialog
GetSystemMetrics
MapDialogRect
SendMessageW
SetWindowContextHelpId
GetDlgItem
GetWindow
SetDlgItemTextW
SendDlgItemMessageW
GetDlgItemTextW
UnregisterClassA
gdi32
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
GetObjectW
GetStockObject
DeleteObject
DeleteDC
CreateSolidBrush
BitBlt
GetDeviceCaps
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExW
ole32
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoTaskMemAlloc
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
StringFromGUID2
CoReleaseServerProcess
CoAddRefServerProcess
CoCreateInstance
oleaut32
SysAllocStringLen
SysAllocString
VariantInit
VariantClear
SysStringLen
LoadRegTypeLi
LoadTypeLi
OleCreateFontIndirect
SysFreeString
DispCallFunc
msvcr100
wcslen
_invoke_watson
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_onexit
_lock
__dllonexit
_unlock
_except_handler4_common
?terminate@@YAXXZ
_wtoi64
malloc
swprintf_s
??2@YAPAXI@Z
calloc
??_U@YAPAXI@Z
memcmp
_recalloc
__CxxFrameHandler3
_wtoi
wcscpy_s
wcscspn
wcsncpy_s
memset
memcpy_s
_CxxThrowException
free
??_V@YAXPAX@Z
??3@YAXPAX@Z
_controlfp_s
Sections
.text Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 572KB - Virtual size: 576KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE