Static task
static1
Behavioral task
behavioral1
Sample
f7c7faffe47ca76678a40176cb9b9f00_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f7c7faffe47ca76678a40176cb9b9f00_NEIKI.exe
Resource
win10v2004-20240508-en
General
-
Target
f7c7faffe47ca76678a40176cb9b9f00_NEIKI
-
Size
32KB
-
MD5
f7c7faffe47ca76678a40176cb9b9f00
-
SHA1
edeb844c2ecedfe14f0ca57e40dfe2760b675719
-
SHA256
12568d8d34405c80a56d2f23c93076b8e49405664db786882c4f22417a72ccf0
-
SHA512
2cff561f11a817a85baa30530fc5dfda3316dfddf0a1531d33a43dd1bb8d73090f0404e057a1a8f6944c171d81742a810f0f1fc9e726655f078ed524d38dad94
-
SSDEEP
384:tk2Wz6pL3a2a999999996cNyoYkytbdH4TIem2yb:K1z6pLxa999999996cgoYkytbdH4U9b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f7c7faffe47ca76678a40176cb9b9f00_NEIKI
Files
-
f7c7faffe47ca76678a40176cb9b9f00_NEIKI.exe windows:4 windows x86 arch:x86
42c4dbd295c85503c861f4931dbd756d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetFocus
MessageBoxA
EndDialog
DispatchMessageW
SendMessageW
GetDlgItem
DialogBoxParamW
SetCapture
GetWindowTextW
TrackPopupMenu
FlashWindowEx
TranslateAcceleratorA
GetKeyState
GetMessageW
GetDlgItemTextA
kernel32
GetModuleHandleW
HeapAlloc
GetProcessHeap
CloseHandle
HeapFree
GetVersionExW
ExitProcess
comctl32
ord17
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 716B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 862B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 270B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.htext Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE