Static task
static1
Behavioral task
behavioral1
Sample
78c2324811d6b8339d33c0dfec78c410_NEIKI.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
78c2324811d6b8339d33c0dfec78c410_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
78c2324811d6b8339d33c0dfec78c410_NEIKI
-
Size
140KB
-
MD5
78c2324811d6b8339d33c0dfec78c410
-
SHA1
717e43f7f6bf2eba4b29f1520f40ba2152ab5491
-
SHA256
14fed79229c71a47074762c38a130672c2ef4727ee27a5b5793a00e26ccaf261
-
SHA512
f9c0a6717b9a17140365b54e764b416380381fadddf92afce6b37161f6eb25a60d2dfb2428bdbfac5f06a2664b71f3c7a557e59b307cd0827f0dca19ec6e9542
-
SSDEEP
3072:nlOZ71bOCor2lQBV+UdE+rECWp7hKeHObF:+78CSBV+UdvrEFp7hKeHObF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 78c2324811d6b8339d33c0dfec78c410_NEIKI
Files
-
78c2324811d6b8339d33c0dfec78c410_NEIKI.exe windows:4 windows x86 arch:x86
312d98b1ac429a8ece86f8f60c2cbe74
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord521
ord6055
ord4078
ord1776
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5290
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord2982
ord3147
ord3259
ord4465
ord3136
ord6307
ord2985
ord3081
ord2976
ord3402
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4424
ord3742
ord818
ord567
ord2077
ord6442
ord1247
ord1233
ord1105
ord1575
ord537
ord3663
ord2841
ord2107
ord5450
ord5440
ord6383
ord6394
ord533
ord798
ord2449
ord2060
ord287
ord6139
ord610
ord4335
ord1638
ord605
ord278
ord966
ord1971
ord5478
ord5796
ord4919
ord4975
ord4863
ord4447
ord4411
ord2031
ord5481
ord5810
ord1791
ord860
ord5683
ord4129
ord858
ord3811
ord2820
ord2818
ord2827
ord2915
ord803
ord540
ord543
ord3584
ord823
ord348
ord1270
ord538
ord800
ord3262
ord825
msvcrt
_controlfp
__CxxFrameHandler
_purecall
printf
_mbscmp
__dllonexit
_onexit
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
?terminate@@YAXXZ
_except_handler3
kernel32
WaitForSingleObject
CancelIo
DeviceIoControl
InterlockedExchangeAdd
CreateFileA
GetLastError
CreateEventA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameA
Sleep
GetVersionExA
ResumeThread
SuspendThread
SetThreadPriority
CreateDirectoryA
InterlockedExchange
GetModuleHandleA
GetCommandLineA
CloseHandle
SetEvent
ResetEvent
user32
GetMessageA
DispatchMessageA
TranslateMessage
PostThreadMessageA
EnableWindow
advapi32
RegisterServiceCtrlHandlerA
SetServiceStatus
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
QueryServiceStatus
StartServiceA
ChangeServiceConfig2A
ControlService
OpenServiceA
DeleteService
OpenSCManagerA
CreateServiceA
CloseServiceHandle
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
StartServiceCtrlDispatcherA
wsock32
WSAGetLastError
listen
closesocket
shutdown
Sections
.text Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ