mstext40.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9778a998fee58f553096afe6bfcf3b90_NEIKI.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9778a998fee58f553096afe6bfcf3b90_NEIKI.dll
Resource
win10v2004-20240426-en
General
-
Target
9778a998fee58f553096afe6bfcf3b90_NEIKI
-
Size
406KB
-
MD5
9778a998fee58f553096afe6bfcf3b90
-
SHA1
70d9b4c39dc2b8e49df9b9f9f2057656e1fd7dbb
-
SHA256
d14be796ae4a5525c8cd8c8152f66d8af5e373c0d1c104e962a703f0e7800c29
-
SHA512
c9a1d0a426b3a165acbd9d7264ef1628e57b3703ac5c510a1501ad5b1e40f20bec09e3abad7307a1aa931ef8b205b029fd64f223fd4cd7ada0450cafccafa904
-
SSDEEP
6144:ilKrwBGXctRrjuVYu6FDhlD0eul4Kq/2b5nOw4WLQtihpmzLzwI5l:wrjkclnR+b5nP4WLK3t5l
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9778a998fee58f553096afe6bfcf3b90_NEIKI
Files
-
9778a998fee58f553096afe6bfcf3b90_NEIKI.dll regsvr32 windows:6 windows x86 arch:x86
adf0e3752c843589d86647f772a64579
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msjet40
ord108
ord158
ord167
ord159
ord172
ord179
ord136
ord101
ord118
ord176
ord170
ord155
ord156
ord173
ord146
mswstr10
ord1
kernel32
GetOEMCP
GetUserDefaultLCID
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
FileTimeToLocalFileTime
FindClose
GetFileTime
ReadFile
SetFilePointer
WriteFile
CloseHandle
GetLastError
FileTimeToDosDateTime
GetCurrentProcessId
GetPrivateProfileStringA
DisableThreadLibraryCalls
GetModuleFileNameA
LoadLibraryExA
WritePrivateProfileStringA
GetFileSize
LoadLibraryW
GetStringTypeW
GetStringTypeA
IsValidCodePage
GetLocaleInfoA
GetSystemDefaultLangID
SetCurrentDirectoryA
SetCurrentDirectoryW
GetCurrentDirectoryA
GetCurrentDirectoryW
CreateDirectoryA
CreateDirectoryW
CreateFileA
CreateFileW
DeleteFileA
DeleteFileW
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
GetDriveTypeW
GetFileAttributesA
GetFileAttributesW
GetFullPathNameA
GetFullPathNameW
RemoveDirectoryA
RemoveDirectoryW
GetTempPathW
GetACP
GetModuleFileNameW
GetModuleHandleW
LoadLibraryExW
GetTempPathA
GetProcAddress
GetLocaleInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
HeapFree
HeapAlloc
GetCommandLineA
GetCurrentThreadId
GetCPInfo
EncodePointer
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetProcessHeap
ExitProcess
GetModuleHandleExW
GetStdHandle
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
EnterCriticalSection
LeaveCriticalSection
LCMapStringW
RaiseException
GetConsoleCP
GetConsoleMode
SetFilePointerEx
HeapReAlloc
OutputDebugStringW
RtlUnwind
SetStdHandle
WriteConsoleW
HeapSize
ReadConsoleW
FlushFileBuffers
FreeLibrary
WideCharToMultiByte
MultiByteToWideChar
SetLastError
user32
CharUpperW
CharUpperA
advapi32
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExW
RegCloseKey
RegOpenKeyExA
oleaut32
SysAllocStringLen
VarI2FromStr
SysFreeString
SysStringByteLen
VarBstrFromDec
VarDecFromStr
SysAllocString
Exports
Exports
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 240KB - Virtual size: 239KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 149KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ