d:\BuildDrive\DGBuild\digitalguardian\product\rel_7.1.2\Agent\win\bin\Release64\afemc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4c6acd166d6ef8bfaaea3aeb93693cf0_NEIKI.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4c6acd166d6ef8bfaaea3aeb93693cf0_NEIKI.exe
Resource
win10v2004-20240226-en
General
-
Target
4c6acd166d6ef8bfaaea3aeb93693cf0_NEIKI
-
Size
1.3MB
-
MD5
4c6acd166d6ef8bfaaea3aeb93693cf0
-
SHA1
23933c64de3986ffec307ea11b88e2c213873c5c
-
SHA256
32ba20e63d0a7326493f39fd862e2af0774e5ffb64be938058b63594f0ec5e3e
-
SHA512
c7fcca724c2a361e208ee6d236532ad6381a1b61595ee091169cc07f4456e997d4eaad5f321ef55dff19292b8e268b457cfd057d4a94fb8aba00087424eb11f2
-
SSDEEP
24576:qjPwHFGRogvIw2FyVMH87ell9ojmXYGlw7JkP15usi3np2S+x:avIw2FyaH8S39oqXDzDusYpW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c6acd166d6ef8bfaaea3aeb93693cf0_NEIKI
Files
-
4c6acd166d6ef8bfaaea3aeb93693cf0_NEIKI.exe windows:6 windows x64 arch:x64
43c7488535415bfe623281fab72ac423
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
CloseServiceHandle
OpenSCManagerW
OpenServiceW
RegQueryInfoKeyW
RegLoadKeyW
RegUnLoadKeyW
OpenProcessToken
AdjustTokenPrivileges
GetTokenInformation
LookupPrivilegeValueW
RegEnumValueW
RegFlushKey
RegRestoreKeyW
RegSaveKeyW
RegSaveKeyExW
QueryServiceStatus
CryptAcquireContextW
CryptReleaseContext
CryptGenKey
CryptGetUserKey
CryptDestroyKey
CryptExportKey
CryptImportKey
CryptSetKeyParam
CryptGenRandom
CryptEncrypt
CryptDecrypt
RegDeleteValueW
LsaNtStatusToWinError
CryptDestroyHash
CryptCreateHash
CryptHashData
CryptGetHashParam
secur32
GetUserNameExW
kernel32
FreeLibrary
LoadResource
LockResource
SizeofResource
LoadLibraryW
FindResourceW
MultiByteToWideChar
WideCharToMultiByte
CreateFileW
CloseHandle
GetLastError
GetFileSize
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
lstrlenW
FindFirstFileExW
FindNextFileW
GetDriveTypeW
GetFileAttributesExW
GetLogicalDriveStringsW
GetVolumeInformationW
ExitProcess
SetConsoleCtrlHandler
DeleteFileW
ReadFile
SetEndOfFile
SetFilePointer
WriteFile
MoveFileExW
DebugBreak
ReplaceFileW
GetStdHandle
GetFileType
GetTickCount
FillConsoleOutputCharacterW
GetConsoleScreenBufferInfo
SetConsoleScreenBufferSize
SetConsoleCursorPosition
ScrollConsoleScreenBufferW
SetConsoleWindowInfo
SetConsoleTextAttribute
GetConsoleTitleW
SetConsoleTitleW
WriteConsoleW
InitializeCriticalSectionEx
SetLastError
DeviceIoControl
DeleteCriticalSection
CopyFileW
CompareFileTime
GetSystemTimeAsFileTime
FileTimeToSystemTime
OutputDebugStringW
QueryPerformanceCounter
EnterCriticalSection
LeaveCriticalSection
Sleep
GetCurrentProcessId
GetCurrentThreadId
LocalAlloc
LocalFree
FormatMessageW
lstrcpynW
DecodePointer
RaiseException
GetModuleHandleW
GetTempFileNameW
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
GetSystemTime
SystemTimeToFileTime
CreateDirectoryW
FlushFileBuffers
LocalFileTimeToFileTime
SetFileTime
SetFileAttributesW
InitializeCriticalSection
CreateEventW
GetWindowsDirectoryW
GetModuleFileNameW
GetComputerNameW
GetOverlappedResult
FindResourceExW
IsBadReadPtr
GlobalMemoryStatus
GetProcessIoCounters
GetCurrentThread
GetProcessTimes
GetProcessHandleCount
LoadLibraryA
GetProcessWorkingSetSize
GetThreadTimes
OutputDebugStringA
LockFileEx
SetFilePointerEx
SetFileValidData
UnlockFileEx
MoveFileW
GetFileSizeEx
FileTimeToLocalFileTime
TerminateProcess
lstrlenA
TlsAlloc
TlsGetValue
TlsSetValue
ReleaseMutex
WaitForSingleObjectEx
CreateMutexW
SetStdHandle
LoadLibraryExW
GetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetConsoleCP
GetTimeZoneInformation
ReadConsoleW
GetOEMCP
GetACP
IsValidCodePage
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetStartupInfoW
TlsFree
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
GetCPInfo
AreFileApisANSI
GetModuleHandleExW
SystemTimeToTzSpecificLocalTime
GetCommandLineW
SetConsoleMode
ReadConsoleInputW
GetConsoleMode
VirtualQuery
VirtualProtect
VirtualAlloc
IsProcessorFeaturePresent
RtlUnwindEx
RtlLookupFunctionEntry
RtlPcToFileHeader
IsDebuggerPresent
EncodePointer
GetStringTypeW
GetSystemInfo
VerSetConditionMask
SetEnvironmentVariableA
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetFileAttributesW
FindFirstFileW
FindClose
ExpandEnvironmentStringsW
GetEnvironmentVariableW
VerifyVersionInfoW
lstrcmpW
GetProcAddress
GetFullPathNameW
user32
GetCaretPos
MessageBoxW
GetFocus
GetProcessWindowStation
GetQueueStatus
GetCapture
GetInputState
GetDesktopWindow
GetCursorPos
wsprintfW
GetActiveWindow
GetClipboardViewer
GetClipboardOwner
GetMessageTime
GetMessagePos
GetOpenClipboardWindow
shell32
SHFileOperationW
SHCreateDirectoryExW
ole32
StringFromCLSID
IIDFromString
CLSIDFromString
CoCreateGuid
CoTaskMemFree
StringFromGUID2
oleaut32
VariantClear
SysAllocString
SysFreeString
SysStringLen
SysAllocStringByteLen
GetErrorInfo
shlwapi
PathIsDirectoryW
PathAppendW
PathRemoveFileSpecW
PathFileExistsW
PathIsRootW
PathRemoveExtensionW
PathSkipRootW
PathRenameExtensionW
PathRemoveBackslashW
PathRemoveBlanksW
PathStripPathW
PathStripToRootW
PathAddBackslashW
PathFindExtensionW
PathCommonPrefixW
rpcrt4
UuidCreateSequential
UuidCreate
crypt32
CertEnumCertificatesInStore
PFXImportCertStore
PFXIsPFXBlob
CertDeleteCertificateFromStore
CertAddCertificateContextToStore
CertOpenStore
CertCloseStore
CryptAcquireCertificatePrivateKey
CertFreeCertificateContext
userenv
UnloadUserProfile
Exports
Exports
RtlCompareMemory
Sections
.text Size: 700KB - Virtual size: 700KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.VSec_CD Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 309KB - Virtual size: 308KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.VSec_DC Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.VSec_DT Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ