Static task
static1
Behavioral task
behavioral1
Sample
d0fc950b2c7aa5b3c47730efe62bec80_NEIKI.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d0fc950b2c7aa5b3c47730efe62bec80_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
d0fc950b2c7aa5b3c47730efe62bec80_NEIKI
-
Size
398KB
-
MD5
d0fc950b2c7aa5b3c47730efe62bec80
-
SHA1
eb38fe4d69084611a1fabc8e9d2fc9964aeec9de
-
SHA256
aa37f4ade15a6cfd3b3569163c27531734505927a6e131c6c932a06af4980771
-
SHA512
9686393d0ffd4f7179e531f33a211a91ed7f41ef1a0034d65fb6aba429822844a537f5f34c435307d7b57f8e0318eb4eda66294ed052ab27f07afdb6509f08fb
-
SSDEEP
3072:zw5rSWAkQfza8JvIoPvSIe6oy/uPy3mm0RiEBoQ:z/WYRJvnCPWQmJEBoQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d0fc950b2c7aa5b3c47730efe62bec80_NEIKI
Files
-
d0fc950b2c7aa5b3c47730efe62bec80_NEIKI.exe windows:4 windows x86 arch:x86
b450e6ae9d47b821b6f1da1c30f1e6b3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
user32
GetKeyboardType
advapi32
RegQueryValueExA
oleaut32
SysFreeString
version
VerQueryValueA
ntdll
RtlGetNtVersionNumbers
urlmon
UrlMkGetSessionOption
shell32
SHGetSpecialFolderLocation
wsock32
WSACleanup
rpcrt4
UuidCreateSequential
Sections
CODE Size: 123KB - Virtual size: 376KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE