Static task
static1
Behavioral task
behavioral1
Sample
e70663816e649cded6e167b914e33a30_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e70663816e649cded6e167b914e33a30_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
e70663816e649cded6e167b914e33a30_NEIKI
-
Size
1.9MB
-
MD5
e70663816e649cded6e167b914e33a30
-
SHA1
007ae850ce5a2b6a2eecf58d3fd4f4f738eed594
-
SHA256
2260d750585e053b9de49a8d4abf233259a2f32315a98edcc903715312d07629
-
SHA512
4ed8a962af3e14b4f7726a58f8f4c77d2936e8853ba29c316a11b287ec80b066fcaec1cf43d890967d9bb7130c373018fdf3a09c1bcfb5c91a339ddfedad4a2f
-
SSDEEP
49152:veNgwu8a+LPSzh5tRwqaZXFvoM4jFCgHr0JEVxYDiSjAHlF3kpiHX02pR:kEcO5gqa9FvoMaFpeo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e70663816e649cded6e167b914e33a30_NEIKI
Files
-
e70663816e649cded6e167b914e33a30_NEIKI.exe windows:4 windows x86 arch:x86
fbdccc5fc6882af34ad3b99c608b6ac6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
InitializeSecurityDescriptor
IsTextUnicode
OpenProcessToken
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
SetSecurityDescriptorDacl
comctl32
InitCommonControls
gdi32
CreateFontIndirectA
GetObjectA
GetStockObject
kernel32
CloseHandle
CreateDirectoryExW
CreateDirectoryW
CreateEventW
CreateFileW
CreatePipe
CreateProcessW
CreateThread
DeleteCriticalSection
DeleteFileW
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileW
FindNextFileW
FlushFileBuffers
FormatMessageW
GetCommandLineA
GetCommandLineW
GetCurrentDirectoryW
GetCurrentProcess
GetDiskFreeSpaceExW
GetEnvironmentVariableW
GetExitCodeProcess
GetFileAttributesExW
GetFileAttributesW
GetLastError
GetLocalTime
GetLocaleInfoW
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStartupInfoW
GetStdHandle
GetTempPathW
GetTickCount
GetUserDefaultLCID
GetVersionExA
InitializeCriticalSection
LeaveCriticalSection
LocalAlloc
LocalFree
MultiByteToWideChar
PeekNamedPipe
ReadFile
RemoveDirectoryW
SetEvent
SetFileAttributesW
SetStdHandle
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcmpA
lstrcmpW
lstrcpynA
lstrcpynW
lstrlenA
lstrlenW
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
calloc
free
fwrite
memcpy
memset
signal
vfprintf
shell32
CommandLineToArgvW
SHGetFolderPathA
user32
CreateWindowExA
CreateWindowExW
DefWindowProcA
DestroyWindow
DispatchMessageA
GetClientRect
GetMessageA
GetSystemMetrics
IsDialogMessageA
LoadCursorA
LoadIconA
LoadImageA
MessageBoxA
MessageBoxW
PostQuitMessage
RegisterClassExA
SendMessageA
SetFocus
SetForegroundWindow
SetWindowTextW
ShowWindow
TranslateMessage
UnregisterClassA
UpdateWindow
wvsprintfW
userenv
GetUserProfileDirectoryW
Sections
.text Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 196B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE