dmrLmS3
Static task
static1
Behavioral task
behavioral1
Sample
437d56ad1d0d5db30a200b972f904020_NEIKI.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
437d56ad1d0d5db30a200b972f904020_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
437d56ad1d0d5db30a200b972f904020_NEIKI
-
Size
73KB
-
MD5
437d56ad1d0d5db30a200b972f904020
-
SHA1
220efb25afb2031bdaedb6e04bd8d3cd972ccf1d
-
SHA256
a6ff6b46c8c18c8667f626aad0a12a4e6b4593f380a19aff65df1aea84ff2b76
-
SHA512
5738bbbd716145e3c9101b23054ecfb177a3ad957ec1c822d78735b7a84b6201801a948ffd870161961dce847b7281ea53abdc536190de3fb594b8bfee73222b
-
SSDEEP
1536:4LbwC+enZ4A/5ldZ9EdXFqRcGWUmRxd01Ml6tq7ULPmq/:QTnZ4wAXAvjmHd0gs9p
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 437d56ad1d0d5db30a200b972f904020_NEIKI
Files
-
437d56ad1d0d5db30a200b972f904020_NEIKI.exe windows:4 windows x86 arch:x86
ac107b335b83277bb79ab71abd62d3e9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetDiskFreeSpaceA
Shell_NotifyIconW
kernel32
LocalAlloc
GetCurrentThreadId
ExitProcess
CreateThread
CreateFileA
DeleteFileA
VirtualAllocEx
DeleteCriticalSection
gdi32
RestoreDC
GetTextColor
SaveDC
user32
GetMenuItemInfoA
GetTopWindow
GetMenuItemID
IsWindowEnabled
GetMenuStringA
DrawMenuBar
GetCapture
Exports
Exports
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 51KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ