SearchIndexer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8472c291a0820c569b96dbce57a59fb0_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8472c291a0820c569b96dbce57a59fb0_NEIKI.exe
Resource
win10v2004-20240426-en
General
-
Target
8472c291a0820c569b96dbce57a59fb0_NEIKI
-
Size
1.1MB
-
MD5
8472c291a0820c569b96dbce57a59fb0
-
SHA1
4cdee5856762e2f01cf62e0eb6a4b86590a7cbd6
-
SHA256
504a750ff35524048b6835cd915620757908aff09053ad0be9f4b1a6b8aac96c
-
SHA512
66f560ef9d9b46328da2b14262e5a80b3c4f354a5ae771c6245c36b09043c2bab12844549880a6a4af5bc3f625aaade5d08fd8c7b3cfed4c69ffd0b9414687c7
-
SSDEEP
24576:RLtGFhahjHeLSZVPRbeEmHg6SMs5Ufx0JlPa:R1hjHeLKZmA9vU4lPa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8472c291a0820c569b96dbce57a59fb0_NEIKI
Files
-
8472c291a0820c569b96dbce57a59fb0_NEIKI.exe windows:6 windows x64 arch:x64
3cd6c1a8cdf1d13fa9e5f7fc626e2c4a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegCreateKeyExW
RegCloseKey
RegSetValueExW
OpenProcessToken
EventWrite
RegSetKeyValueW
RegDeleteValueW
RegGetValueW
RegOpenKeyExW
RegEnumKeyExW
RegQueryValueExW
RegQueryInfoKeyW
InitializeSecurityDescriptor
EventUnregister
InitializeAcl
EventEnabled
EventRegister
OpenThreadToken
StartServiceCtrlDispatcherW
SetSecurityDescriptorGroup
RegisterServiceCtrlHandlerExW
GetTokenInformation
GetAclInformation
CopySid
LookupAccountNameW
SetSecurityDescriptorDacl
GetAce
SetServiceStatus
SetSecurityDescriptorOwner
AddAccessAllowedAce
IsValidSid
AddAce
GetLengthSid
SetFileSecurityW
IsValidAcl
GetSidSubAuthority
SetTokenInformation
GetSecurityDescriptorLength
LookupAccountSidW
ImpersonateLoggedOnUser
MakeAbsoluteSD
RevertToSelf
GetSidLengthRequired
InitializeSid
MakeSelfRelativeSD
CreateWellKnownSid
RegisterEventSourceW
DeregisterEventSource
ReportEventW
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegCreateKeyTransactedW
RegOpenKeyTransactedW
RegDeleteKeyTransactedW
GetSecurityDescriptorOwner
GetSecurityDescriptorGroup
GetSecurityDescriptorDacl
GetSecurityDescriptorSacl
CheckTokenMembership
GetSecurityDescriptorControl
kernel32
LoadLibraryExA
GetCurrentProcessId
GetCurrentThreadId
DeleteCriticalSection
HeapSetInformation
LockResource
EnterCriticalSection
RaiseException
MultiByteToWideChar
LeaveCriticalSection
SizeofResource
Sleep
LoadLibraryW
InitializeCriticalSection
GetProcessHeap
HeapFree
SetEnvironmentVariableW
LoadResource
FindResourceW
FindResourceExW
SetPriorityClass
CreateMutexW
GetNLSVersion
lstrcmpiW
GetProcAddress
lstrlenW
CompareStringW
GetModuleFileNameW
WideCharToMultiByte
GetSystemDirectoryW
GetModuleHandleW
OutputDebugStringW
GetSystemDefaultLCID
GetModuleHandleExW
GetCurrentProcess
LoadLibraryExW
FreeLibrary
GetVolumeInformationW
FindFirstVolumeW
CloseHandle
SetLastError
GetLastError
GetVolumePathNamesForVolumeNameW
FindNextVolumeW
SetErrorMode
GetDriveTypeW
FindVolumeClose
GetUserDefaultUILanguage
DelayLoadFailureHook
GetSystemDefaultUILanguage
SearchPathW
GetSystemPreferredUILanguages
LocaleNameToLCID
ResolveLocaleName
CreateFileMappingW
ReleaseMutex
DeleteFileA
GetLocalTime
CopyFileA
FormatMessageW
FlushViewOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileA
LCMapStringW
FileTimeToSystemTime
GetTimeFormatW
SystemTimeToTzSpecificLocalTime
LocalFree
SetFileAttributesW
DeleteFileW
RemoveDirectoryW
MoveFileW
lstrcmpW
CreateFileW
GetFileAttributesW
CopyFileW
GetLocaleInfoW
CompareFileTime
FindFirstFileW
GetVersionExA
HeapDestroy
HeapAlloc
HeapReAlloc
HeapSize
lstrlenA
GetEnvironmentVariableW
GetStartupInfoW
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
OutputDebugStringA
VerSetConditionMask
GetVersionExW
VerifyVersionInfoW
CreateDirectoryW
WaitForSingleObject
FindFirstFileExW
FindClose
FindNextFileW
CreateThread
ExpandEnvironmentStringsW
SetEvent
GetCurrentThread
CreateEventW
RegNotifyChangeKeyValue
OpenEventW
DuplicateHandle
GetTickCount64
RegEnumValueW
RegDeleteKeyExW
GetCommandLineW
user32
DispatchMessageW
PeekMessageW
MsgWaitForMultipleObjects
UnregisterClassA
UnregisterDeviceNotification
RegisterDeviceNotificationW
LoadStringW
CharNextW
msvcrt
_errno
realloc
_onexit
_lock
__dllonexit
_unlock
??1type_info@@UEAA@XZ
?terminate@@YAXXZ
__set_app_type
_fmode
_commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_cexit
_ismbblead
_exit
_XcptFilter
__getmainargs
calloc
__C_specific_handler
memset
malloc
wcsncpy_s
memmove_s
wcsncmp
memcpy_s
swscanf_s
_vsnwprintf
wcsrchr
_wcsnicmp
free
_wcsicmp
towupper
qsort
wcsstr
wcspbrk
_vscwprintf
vswprintf_s
memcpy
_CxxThrowException
memcmp
bsearch
wcschr
iswspace
_wtol
swscanf
strncmp
fprintf
_vsnprintf
_iob
__CxxFrameHandler3
ntdll
RtlNtStatusToDosError
NtOpenFile
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WinSqmIncrementDWORD
WinSqmSetDWORD
WinSqmIsOptedIn
WinSqmAddToStream
RtlInitUnicodeString
ole32
CoImpersonateClient
CoRevertToSelf
CoCreateInstance
CoTaskMemFree
CoUninitialize
CoTaskMemRealloc
CoTaskMemAlloc
CoInitializeEx
CoInitializeSecurity
CoRevokeClassObject
CoRegisterClassObject
oleaut32
SysAllocString
SysAllocStringByteLen
SysFreeString
SysStringLen
VariantClear
VariantInit
VarBstrCat
SysAllocStringLen
SysStringByteLen
LoadTypeLi
VarUI4FromStr
LoadRegTypeLi
tquery
?ciNew@@YAPEAX_K@Z
?ciDelete@@YAXPEAX@Z
?ciNewNoThrow@@YAPEAX_K@Z
shlwapi
SHCopyKeyW
PathIsUNCServerShareW
PathAddBackslashW
SHGetValueW
SHSetValueW
PathRemoveBackslashW
SHDeleteKeyW
PathStripToRootW
PathIsDirectoryW
ord154
PathCanonicalizeW
PathFileExistsW
PathSkipRootW
PathFindNextComponentW
SHRegGetValueW
SHStrDupW
PathIsUNCW
PathIsUNCServerW
PathAppendW
PathIsRootW
mssrch
??1CSearchServiceObj@@QEAA@XZ
??0CSearchServiceObj@@QEAA@XZ
?Cleanup@CSearchServiceObj@@SAHXZ
imm32
ImmDisableIME
Sections
.text Size: 320KB - Virtual size: 319KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 572KB - Virtual size: 576KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE