ALG.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a834f0e055d5da45fd8b0de6bf9b7bc0_NEIKI.exe
Resource
win10v2004-20240426-en
General
-
Target
a834f0e055d5da45fd8b0de6bf9b7bc0_NEIKI
-
Size
1.2MB
-
MD5
a834f0e055d5da45fd8b0de6bf9b7bc0
-
SHA1
6c1110970555cfd58c20f33da9f28d5b41f04c5f
-
SHA256
e2a553a1ae0d07849bc1080255068bc53815ff25f8e1b28624322f3ed09fa540
-
SHA512
6f8d074086e7044e25088f9adcc7b7ec6a52836ff9415e7b07453de733f516bb788fea9d9028867e347629c9187713146a24e083d68488a62249a3da8bee0aff
-
SSDEEP
12288:cr+IBQQWttxhvIoRB+tgqnub1zVjmuo5R6FMSPb/gFyjXpO:c/QQ+xhvIo7+ttI1JNq6FMSsFyjM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a834f0e055d5da45fd8b0de6bf9b7bc0_NEIKI
Files
-
a834f0e055d5da45fd8b0de6bf9b7bc0_NEIKI.exe windows:10 windows x64 arch:x64
63879732bf2bfd01cf874c563a6cac5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
msvcrt
_cexit
_amsg_exit
_exit
_onexit
__set_app_type
__dllonexit
_XcptFilter
_wcmdln
_CxxThrowException
_unlock
_lock
??1type_info@@UEAA@XZ
__wgetmainargs
exit
__CxxFrameHandler3
_initterm
?terminate@@YAXXZ
_commode
__setusermatherr
isdigit
_callnewh
??0exception@@QEAA@AEBQEBDH@Z
memmove
??0exception@@QEAA@XZ
memmove_s
memcpy_s
_wcsicmp
?what@exception@@UEBAPEBDXZ
realloc
wcscat_s
malloc
free
??0exception@@QEAA@AEBV0@@Z
??1exception@@UEAA@XZ
??0exception@@QEAA@AEBQEBD@Z
__C_specific_handler
_fmode
memcmp
memcpy
memset
api-ms-win-core-synch-l1-2-0
WaitForSingleObject
SetEvent
EnterCriticalSection
Sleep
LeaveCriticalSection
CreateEventW
InitializeCriticalSection
DeleteCriticalSection
api-ms-win-core-libraryloader-l1-2-0
LoadResource
GetModuleHandleW
LoadLibraryExW
GetProcAddress
SizeofResource
GetModuleFileNameW
FindResourceExW
FreeLibrary
api-ms-win-core-string-l2-1-0
CharPrevW
CharNextW
api-ms-win-core-errorhandling-l1-1-1
GetLastError
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
api-ms-win-core-registry-l1-1-0
RegEnumKeyExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
RegSetValueExW
RegQueryInfoKeyW
RegCreateKeyExW
RegDeleteValueW
RegNotifyChangeKeyValue
api-ms-win-core-memory-l1-1-2
VirtualQuery
VirtualProtect
VirtualAlloc
api-ms-win-core-sysinfo-l1-2-1
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetVersionExW
api-ms-win-core-string-l1-1-0
MultiByteToWideChar
api-ms-win-core-handle-l1-1-0
DuplicateHandle
CloseHandle
api-ms-win-core-synch-l1-2-1
WaitForMultipleObjects
api-ms-win-core-heap-l1-2-0
HeapFree
HeapDestroy
HeapAlloc
GetProcessHeap
HeapSetInformation
api-ms-win-core-processthreads-l1-1-2
GetCurrentThreadId
GetStartupInfoW
GetCurrentProcess
GetCurrentProcessId
TerminateProcess
CreateThread
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-rtlsupport-l1-2-0
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlCaptureContext
api-ms-win-core-threadpool-legacy-l1-1-0
DeleteTimerQueueEx
DeleteTimerQueueTimer
CreateTimerQueue
CreateTimerQueueTimer
api-ms-win-core-string-obsolete-l1-1-0
lstrcpynW
lstrcmpiW
cryptbase
SystemFunction036
mswsock
AcceptEx
GetAcceptExSockaddrs
api-ms-win-core-file-l1-2-1
ReadFile
WriteFile
api-ms-win-core-delayload-l1-1-1
ResolveDelayLoadedAPI
DelayLoadFailureHook
api-ms-win-core-kernel32-legacy-l1-1-1
BindIoCompletionCallback
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 280B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.1MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE