C:\cak81-bojevajob\gijonavuc70\calori_cum.pdb
Static task
static1
Behavioral task
behavioral1
Sample
88f173d3106eec489eeb0cfb9d93ab90_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
88f173d3106eec489eeb0cfb9d93ab90_NEIKI.exe
Resource
win10v2004-20240508-en
General
-
Target
88f173d3106eec489eeb0cfb9d93ab90_NEIKI
-
Size
276KB
-
MD5
88f173d3106eec489eeb0cfb9d93ab90
-
SHA1
8ea7e398491bdd803956ba29660a6d5fe7c69692
-
SHA256
81a69ae81239de2b87658d6056fe0b9dfb1663c5dacc279646a22b47af06c478
-
SHA512
510832b3a68c9e9839763736e49eaa9cfd5d4dc00e8b17edec18e56d0252e8077485d1b56eabbc2b658badbb579d610ef1c0e32505389ec429f314d4fd43ce3f
-
SSDEEP
3072:TAfmxj3LlZF9H+52cTKqRMIsWkll98jTfjBbBBhRXQrt7ovbeBT:/lp9m2cTUqASTfj9B5k9M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 88f173d3106eec489eeb0cfb9d93ab90_NEIKI
Files
-
88f173d3106eec489eeb0cfb9d93ab90_NEIKI.exe windows:5 windows x86 arch:x86
406de49a03a07b95a2cb32358d5dae3d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetConsoleAliasExesLengthA
GlobalAddAtomA
EndUpdateResourceW
GetConsoleAliasA
CreateJobObjectW
FreeEnvironmentStringsA
GetNumberFormatA
GetWindowsDirectoryA
GetGeoInfoW
GetVolumePathNameW
LoadLibraryW
GetSystemWindowsDirectoryA
InterlockedPopEntrySList
GetNamedPipeInfo
CreateFileW
GetConsoleAliasesW
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
SetLocalTime
EnumDateFormatsExA
RemoveDirectoryA
GetPrivateProfileStringA
OpenWaitableTimerA
LoadLibraryA
Process32FirstW
CreateFileMappingA
LocalAlloc
SetConsoleWindowInfo
GetSystemInfo
GlobalFindAtomW
FindFirstVolumeMountPointA
GetModuleHandleA
ReadConsoleInputW
TlsAlloc
GetCurrentProcessId
GetConsoleProcessList
ReadFile
SearchPathW
FindResourceA
DebugActiveProcess
CreateNamedPipeA
GetProcessHeap
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
HeapFree
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapAlloc
SetHandleCount
GetFileType
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
HeapSize
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
InitializeCriticalSectionAndSpinCount
SetFilePointer
GetConsoleCP
GetConsoleMode
CloseHandle
CreateFileA
LCMapStringA
LCMapStringW
FlushFileBuffers
user32
GetMessageExtraInfo
CharToOemBuffA
gdi32
GetCharABCWidthsFloatW
advapi32
LogonUserA
ReadEventLogA
shell32
ShellAboutW
ole32
CoRegisterPSClsid
winhttp
WinHttpCheckPlatform
Sections
.text Size: 202KB - Virtual size: 202KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 715KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ