C:\b\g\cp353\_light_\Release\launch_normal.pdb
Static task
static1
Behavioral task
behavioral1
Sample
684161d4972b30690c7bc38ce2fc2c70_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
684161d4972b30690c7bc38ce2fc2c70_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
684161d4972b30690c7bc38ce2fc2c70_NEIKI
-
Size
894KB
-
MD5
684161d4972b30690c7bc38ce2fc2c70
-
SHA1
798e27101b7b1f2c35660ee0d782fd77c36d7891
-
SHA256
0fe4ea0055de0fbbfd8cbbbf5e99dd4c25c101e548a62b55299d321cd9b51e6c
-
SHA512
4a2a409ad94a225564b1d79830d58ed7374c5a10d0ab6421293fb0304784149fc199a035c3da3b9bc6b9e56c28aa617e6cbe9a6cf9fef02d629cc274e8c96340
-
SSDEEP
24576:crHdh5ndPD/YpEjeXz/rq6Kk+FAkEd1Qv:cDdh5ndPoEa/+6EFAkEd1u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 684161d4972b30690c7bc38ce2fc2c70_NEIKI
Files
-
684161d4972b30690c7bc38ce2fc2c70_NEIKI.exe windows:4 windows x86 arch:x86
7369d3eedf3ea7e9215eda88f8517a38
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindClose
GetVersion
Sleep
SetEvent
OpenEventA
GetCurrentProcess
GetProcAddress
GetModuleHandleA
GetExitCodeProcess
CreateEventA
GetCurrentProcessId
FormatMessageA
TerminateProcess
IsBadReadPtr
SetLastError
DuplicateHandle
FreeLibrary
LoadLibraryA
GetVersionExA
lstrcmpA
lstrcpyA
lstrlenA
lstrcatA
GetFileAttributesA
GetFileAttributesW
CreateFileA
CreateFileW
FindFirstFileA
FindFirstFileW
FindNextFileA
UnmapViewOfFile
GetModuleFileNameA
GetModuleFileNameW
SetCurrentDirectoryA
SetCurrentDirectoryW
DeleteFileA
DeleteFileW
RemoveDirectoryA
RemoveDirectoryW
SetFileAttributesA
SetFileAttributesW
CreateDirectoryA
CreateDirectoryW
MoveFileA
MoveFileW
MultiByteToWideChar
WideCharToMultiByte
CreateProcessA
CreateProcessW
LoadLibraryW
ExpandEnvironmentStringsA
ExpandEnvironmentStringsW
GetCommandLineA
GetCommandLineW
WaitForSingleObject
CreateThread
CloseHandle
SetFilePointer
GetFileSize
CreateFileMappingA
MapViewOfFile
GetLastError
HeapFree
GetProcessHeap
FindNextFileW
HeapAlloc
user32
MessageBoxA
MsgWaitForMultipleObjects
PeekMessageA
RegisterClassA
CreateWindowExA
ShowWindow
DefWindowProcA
DispatchMessageA
shell32
ShellExecuteExA
advapi32
RegQueryValueExW
RegOpenKeyExA
AllocateAndInitializeSid
FreeSid
EqualSid
GetTokenInformation
OpenProcessToken
RegCloseKey
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ