Static task
static1
Behavioral task
behavioral1
Sample
38151118f43356ff6384ae72010eab60_NEIKI.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
38151118f43356ff6384ae72010eab60_NEIKI.exe
Resource
win10v2004-20240426-en
General
-
Target
38151118f43356ff6384ae72010eab60_NEIKI
-
Size
9.5MB
-
MD5
38151118f43356ff6384ae72010eab60
-
SHA1
cd818e1d02cca229d32e4a774354b908fafdfc45
-
SHA256
a20b276d4b929bd3efb6bcd571d39df41c93c1b147a1518630c886bffb6fa38d
-
SHA512
f02a8ce53d015fade1460cc39323dc7f521d11d6e111024a877efa4c9b084b2309cc57f1c53ee88488f8fe8465fb657379ab62881a5bf665178656cbab9c8bd7
-
SSDEEP
196608:1TsefLFYJhmtGbZRbFHAfLAWP7P/Rf4DzMvUCCFGV5JcEqM:OYFYJhUcZRbFHAfLAY7P/56zMvv5GM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 38151118f43356ff6384ae72010eab60_NEIKI
Files
-
38151118f43356ff6384ae72010eab60_NEIKI.exe windows:4 windows x86 arch:x86
62f205fe3d5e06c190cbad78ac9b9e4e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
pbvm90
ord137
kernel32
GetModuleFileNameA
FreeEnvironmentStringsA
LoadLibraryA
GetProcAddress
GetCommandLineA
GetCPInfo
IsDBCSLeadByte
GetModuleHandleA
GetStartupInfoA
GetVersion
ExitProcess
GetACP
GetOEMCP
MultiByteToWideChar
WideCharToMultiByte
LCMapStringA
LCMapStringW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
GetStringTypeA
VirtualFree
RtlUnwind
WriteFile
GetStringTypeW
HeapFree
HeapAlloc
VirtualAlloc
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ