Static task
static1
Behavioral task
behavioral1
Sample
6021711044298656aed01031e0ad6e00_NEIKI.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6021711044298656aed01031e0ad6e00_NEIKI.exe
Resource
win10v2004-20240426-en
General
-
Target
6021711044298656aed01031e0ad6e00_NEIKI
-
Size
119KB
-
MD5
6021711044298656aed01031e0ad6e00
-
SHA1
f9f35d9cb8a8a1bbad43272d033a227b137b0b71
-
SHA256
bc2cd29cb89566782753e9e7cf03a644a1883f90c3cda0f3fb1b5c134225ff74
-
SHA512
3b0e438a25a6841e70ee093f6432441e27962f76124b952a7a0060cf84e5b2404ac7b2504a9fb38869c0fd37bdc2f746619d487617b6cac0e2f033d55fd668d0
-
SSDEEP
3072:cVu5GZJ3gJZ4s92IDvudziWbZSEqY0MM2:cqb9ZIqYTL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6021711044298656aed01031e0ad6e00_NEIKI
Files
-
6021711044298656aed01031e0ad6e00_NEIKI.exe windows:4 windows x86 arch:x86
7be5138cd5ce15b423b9af34a8790aeb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
StartThreadpoolIo
SetConsolePalette
SetConsoleCtrlHandler
EnumSystemLanguageGroupsW
OpenFileMappingA
CreateMutexExA
SetThreadToken
UnregisterApplicationRecoveryCallback
GetProcessDEPPolicy
GetPrivateProfileSectionNamesA
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 105KB - Virtual size: 126KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE