Static task
static1
Behavioral task
behavioral1
Sample
5723d5368ee59d1296b566c5b37cf140_NEIKI.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
5723d5368ee59d1296b566c5b37cf140_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
5723d5368ee59d1296b566c5b37cf140_NEIKI
-
Size
181KB
-
MD5
5723d5368ee59d1296b566c5b37cf140
-
SHA1
a422151da6395348afde7272d1b814d622875b57
-
SHA256
3bf10b761c289f420e7ff6ac1987705b726a1e96975299467138bae25d4c9e18
-
SHA512
79f70dd19446477471550bd2689223ff65b726f2c7a2da3ec7ba9ac9c7ad659b040051714f6198a0130d9578d597fe241c04ea8baf2bcf7e80b161e2ebe53014
-
SSDEEP
3072:+B8Qcf7Ns0XG25vpz0PNGjCBAMLdR+YDtzT1wNBHHOVpZZ9cQJkVGRXNicEFZnrF:McuYGCm2CBAGX+YZn10BHHYpLGQJ9viD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5723d5368ee59d1296b566c5b37cf140_NEIKI
Files
-
5723d5368ee59d1296b566c5b37cf140_NEIKI.exe windows:4 windows x86 arch:x86
91c97196575b40403b72ef09d7d1ec5d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
GetVolumeInformationA
_lopen
GetModuleFileNameA
lstrcmpA
GetVersionExA
GetModuleHandleA
GetFileAttributesA
SetFileAttributesA
SetFileTime
GetFileTime
SystemTimeToFileTime
CreateFileA
_llseek
IsDBCSLeadByte
FileTimeToSystemTime
WriteFile
lstrcpynA
SearchPathA
GetSystemDirectoryA
GetEnvironmentVariableA
GetWindowsDirectoryA
GetStartupInfoA
lstrcatA
GetCurrentDirectoryA
CreateDirectoryA
lstrcpyA
_lread
CloseHandle
DeleteFileA
_lclose
LocalFree
GetUserDefaultLangID
lstrlenA
user32
KillTimer
DialogBoxParamA
SetWindowTextA
GetSystemMetrics
GetWindowRect
MessageBoxA
EndDialog
SetFocus
MoveWindow
LoadIconA
SetTimer
IsIconic
DestroyIcon
BeginPaint
SendMessageA
DrawIcon
SendDlgItemMessageA
CharPrevA
GetDlgItem
EnableWindow
GetDlgItemTextA
PostMessageA
CharUpperA
SetDlgItemTextA
PeekMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
wsprintfA
CharLowerA
CharNextA
EndPaint
gdi32
SetMapMode
GetMapMode
comdlg32
GetFileTitleA
GetOpenFileNameA
advapi32
RegSetValueExA
RegCreateKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegSetValueA
shell32
ShellExecuteA
crtdll
strrchr
_global_unwind2
exit
strchr
_local_unwind2
atoi
memset
_exit
_XcptFilter
_acmdln_dll
_initterm
__GetMainArgs
_commode_dll
_fmode_dll
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 149B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ