Static task
static1
Behavioral task
behavioral1
Sample
7cb14e6f43cdd4ebde295a865110af20_NEIKI.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7cb14e6f43cdd4ebde295a865110af20_NEIKI.exe
Resource
win10v2004-20240426-en
General
-
Target
7cb14e6f43cdd4ebde295a865110af20_NEIKI
-
Size
157KB
-
MD5
7cb14e6f43cdd4ebde295a865110af20
-
SHA1
7ade584ff0aa88e6e365417b7747d9f3e4c176ad
-
SHA256
0a03863760ee9bbed32c31526f910b80d5f932e903fbcc5e95cc982274e0ead3
-
SHA512
ed6cf4b53550434e38908ce868597c9ae7a83ccb170f82c5ab286f4e0fc1896d88049b9bef8245ddf93c147ec92357ef5d2c1644be9c3e637f26bacc120e66e5
-
SSDEEP
3072:PewjyYsAq/C3RCzgJHvNA1PpYfFL6zU+BEfi:2wjjqahUSPe1SZ+h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7cb14e6f43cdd4ebde295a865110af20_NEIKI
Files
-
7cb14e6f43cdd4ebde295a865110af20_NEIKI.exe windows:5 windows x86 arch:x86
cb59e9f2348b37e98c5e9c617c66b271
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memcpy
_snprintf
memset
netapi32
NetQueryDisplayInformation
NetApiBufferFree
NetUserGetInfo
shell32
ord680
shlwapi
StrStrIA
PathFileExistsA
ntdll
RtlCreateUserThread
RtlAdjustPrivilege
kernel32
GlobalFindAtomA
GetModuleFileNameW
GlobalAddAtomA
WriteProcessMemory
VirtualAllocEx
CreateProcessA
CreateRemoteThread
MultiByteToWideChar
FlushInstructionCache
Sleep
ExitProcess
HeapValidate
GetProcessHeap
HeapFree
HeapAlloc
GetTempPathA
GetTempFileNameA
GetProcAddress
GetModuleFileNameA
GetModuleHandleA
GetTickCount
GetVolumeInformationA
GetSystemWindowsDirectoryA
VirtualQuery
GetCurrentProcess
VirtualFree
VirtualAlloc
DeleteFileA
Process32First
OpenProcess
Process32Next
CreateToolhelp32Snapshot
CloseHandle
CreateFileA
MoveFileExA
lstrcpynA
SetEndOfFile
SetFileTime
WriteFile
IsBadWritePtr
ReadFile
GetFileSizeEx
GetFileTime
CopyFileA
user32
CharUpperA
advapi32
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
CreateProcessWithLogonW
GetUserNameA
RegCloseKey
RegFlushKey
RegQueryValueExA
ole32
CoUninitialize
CoCreateInstance
CoInitializeEx
oleaut32
SysFreeString
SysAllocString
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 136KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ