Static task
static1
Behavioral task
behavioral1
Sample
30b7b94721314b320cb1212764669cf0_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
30b7b94721314b320cb1212764669cf0_NEIKI.exe
Resource
win10v2004-20240226-en
General
-
Target
30b7b94721314b320cb1212764669cf0_NEIKI
-
Size
119KB
-
MD5
30b7b94721314b320cb1212764669cf0
-
SHA1
323be5da0776eeb45c61fc9e48f8748aa6cc2f2c
-
SHA256
a8a606a829c0874fe908e87d4ca973102cc0521801a6e7de1173a561cd520229
-
SHA512
96e922d97ac12d452502b62939d1cb84301ef612277cf8f9740c5df06c39f974a54df9f3d82ca34c8cf963cf5530daabadeb0fc12425600477705108427dce01
-
SSDEEP
3072:CA0YTLHRdhVpYg211l1DugcRXn88nwN5Ys2sYB:6ELR9egMXNa7a5msQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 30b7b94721314b320cb1212764669cf0_NEIKI
Files
-
30b7b94721314b320cb1212764669cf0_NEIKI.exe windows:4 windows x86 arch:x86
8bfe41d0faa3aea1465f98188fc37b5f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DelayLoadFailureHook
BasepAnsiStringToDynamicUnicodeString
DiscardVirtualMemory
CreateSymbolicLinkTransactedW
EnumCalendarInfoExW
GetVolumePathNamesForVolumeNameA
GetThreadGroupAffinity
GetNumaAvailableMemoryNode
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 105KB - Virtual size: 126KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE