Static task
static1
Behavioral task
behavioral1
Sample
34c30cca698e3db2cacedb1f9417dac0_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
34c30cca698e3db2cacedb1f9417dac0_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
34c30cca698e3db2cacedb1f9417dac0_NEIKI
-
Size
367KB
-
MD5
34c30cca698e3db2cacedb1f9417dac0
-
SHA1
c6dc79f40e65a64b1912d2d14939f889deadb0ce
-
SHA256
b96eb76a6acb6f96d666e9b14cf18cc31a65b439a92118e55059665a60b405b7
-
SHA512
5c8d9866c3a2b6697f03d443ca11c42c254fdf840302888fba2f215f0990c79273366f07d432189663116817ee61bb79e92714e02b69c4450a83117647938ed5
-
SSDEEP
6144:clzoa7yNgAIQo8OLamr3RLiRnHhq92gkqnC2v7LA+Fq3PTzhVy:ctB7yNgD83m3kE92TqC25sPPi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 34c30cca698e3db2cacedb1f9417dac0_NEIKI
Files
-
34c30cca698e3db2cacedb1f9417dac0_NEIKI.exe windows:5 windows x86 arch:x86
b40c457657c59e9d515f1130618a2f1e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
CreateFileA
GetTickCount
GetModuleHandleA
GetCommandLineA
GetProcAddress
GetStartupInfoA
ExitProcess
user32
GetSystemMetrics
LoadBitmapA
GetMessageA
LoadIconA
LoadMenuA
PostQuitMessage
RegisterClassExA
ReleaseDC
SetMenu
ShowWindow
TranslateMessage
UpdateWindow
LoadIconW
GetDC
EndPaint
DispatchMessageA
DefWindowProcA
CreateWindowExA
BeginPaint
LoadCursorA
gdi32
SelectObject
DeleteDC
CreateCompatibleDC
BitBlt
advapi32
RegOpenKeyA
Sections
.text Size: 173KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 948B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 280B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.htext Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE