Static task
static1
Behavioral task
behavioral1
Sample
7fac7970eea5cd3ac015f25adf2a2ca0_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7fac7970eea5cd3ac015f25adf2a2ca0_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
7fac7970eea5cd3ac015f25adf2a2ca0_NEIKI
-
Size
156KB
-
MD5
7fac7970eea5cd3ac015f25adf2a2ca0
-
SHA1
138bccee98f7f3abaabde5e252415fb94f1de96b
-
SHA256
dda08d3b5041114ded576a7538c6ea3afee92efe1cf71432ee0a37bd70bc5205
-
SHA512
464bbac87dfb019665211ce9e5961ee9c659bff8ba40b8e3f7f316bfd7c1dfe566833a678e125906c51a7a31203e7cea6ffe595f9f2e4f1487d3d1bdb81f9c53
-
SSDEEP
1536:MZtnkTKOyYYYhUN/NHlbWuOdrU6XbMHI35Q5OYAdeoB:MZtnkTKOyYwNVNWuorMH1Ad
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7fac7970eea5cd3ac015f25adf2a2ca0_NEIKI
Files
-
7fac7970eea5cd3ac015f25adf2a2ca0_NEIKI.exe windows:4 windows x86 arch:x86
9ab362b97c1e014b9492c63d64d09f98
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
EVENT_SINK_GetIDsOfNames
ord696
MethCallEngine
EVENT_SINK_Invoke
ord516
ord518
ord519
ord553
ord660
ord662
Zombie_GetTypeInfo
ord669
ord591
ord592
ord595
ord598
ord520
ord522
ord524
ord631
ord525
ord632
ord526
EVENT_SINK_AddRef
ord527
ord528
ord529
ord560
DllFunctionCall
ord563
Zombie_GetTypeInfoCount
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord714
ord607
ord608
ord319
ProcCallEngine
ord537
ord538
ord539
ord571
ord572
ord573
ord577
ord685
ord100
ord320
ord321
ord613
ord616
ord617
ord619
ord542
ord543
ord650
ord544
ord651
ord652
ord545
ord546
ord581
Sections
.text Size: 104KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ