Static task
static1
Behavioral task
behavioral1
Sample
04626cfec0324a44c97b22c467f19890_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
04626cfec0324a44c97b22c467f19890_NEIKI.exe
Resource
win10v2004-20240508-en
General
-
Target
04626cfec0324a44c97b22c467f19890_NEIKI
-
Size
351KB
-
MD5
04626cfec0324a44c97b22c467f19890
-
SHA1
0f57842cc191982e329474cb12a4d72ab3f8d492
-
SHA256
19ee5fbeb26689d73e4dac3c0c324db98dc2cfa060587c22952d5904fd26ac07
-
SHA512
f063d42f0cf6763e57cd79c9a39bf5797f8ad251332d65bfc12fe2610836d40879c42100087983f09b64e0d715d706434f1362cc7bbdb5855fee05aa4e16be71
-
SSDEEP
6144:yFQ7JNcW/qb7IeNws4xLYOy+K58RChsfbBhrUxTcZd3cbxivPv0bbC8rEKJWu9Gx:yFwcGqb7IeNws4xLYOy+K5EbBhrmTcZz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04626cfec0324a44c97b22c467f19890_NEIKI
Files
-
04626cfec0324a44c97b22c467f19890_NEIKI.exe windows:4 windows x86 arch:x86
3212f02ba61607583706217b17a7a70f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AccessCheck
AddAccessAllowedAce
AllocateAndInitializeSid
DuplicateToken
FreeSid
GetLengthSid
InitializeAcl
InitializeSecurityDescriptor
IsValidSecurityDescriptor
OpenProcessToken
OpenThreadToken
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyExW
RegOpenKeyExW
RegOpenKeyW
RegQueryInfoKeyW
RegQueryValueExW
RegSetValueExW
SetEntriesInAclW
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
kernel32
AddAtomA
CloseHandle
CreateDirectoryW
CreateFileW
CreateProcessW
CreateSemaphoreA
CreateToolhelp32Snapshot
DeleteCriticalSection
DeleteFileW
EnterCriticalSection
ExitProcess
FindAtomA
FormatMessageW
GetAtomNameA
GetCommandLineA
GetCommandLineW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetEnvironmentVariableW
GetExitCodeProcess
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetStartupInfoA
GetSystemDefaultLCID
GetUserDefaultLCID
GetVersionExW
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsValidLocale
LeaveCriticalSection
LocalAlloc
LocalFree
MultiByteToWideChar
OpenProcess
Process32FirstW
Process32NextW
ReadFile
ReleaseSemaphore
SetEnvironmentVariableW
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
WideCharToMultiByte
msvcrt
_fdopen
_read
_strdup
_write
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_ctype
_errno
_filelengthi64
_fstati64
_iob
_lseeki64
_onexit
_setmode
_wfopen
_wrmdir
_wstat
abort
atexit
fclose
fflush
fgetpos
fopen
fread
free
fsetpos
fwprintf
fwrite
fwscanf
getc
malloc
memchr
memcpy
memmove
memset
putc
setlocale
setvbuf
signal
strcmp
strcoll
strcpy
strftime
strlen
strstr
strtod
strxfrm
toupper
ungetc
wcscat
wcscmp
wcscpy
wcslen
wcsrchr
wcsstr
ole32
CoCreateInstance
CoInitialize
oleaut32
SysAllocString
SysFreeString
shell32
SHGetDesktopFolder
SHGetMalloc
SHGetSpecialFolderPathW
ShellExecuteExW
shlwapi
PathFileExistsW
PathRemoveBackslashW
user32
GetDlgItem
LoadStringW
MessageBoxW
RegisterWindowMessageW
SendMessageTimeoutW
SetWindowTextW
Sections
.text Size: 272KB - Virtual size: 272KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 704B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 21KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE