Static task
static1
Behavioral task
behavioral1
Sample
4d331740a14a125be4e739d795aa1e70_NEIKI.exe
Resource
win7-20240419-en
General
-
Target
4d331740a14a125be4e739d795aa1e70_NEIKI
-
Size
336KB
-
MD5
4d331740a14a125be4e739d795aa1e70
-
SHA1
bd39d4cbb43bb4ffd9c811185a6007bf87a6509a
-
SHA256
a50186727b868d1faf57738e2cb43436cbd66b565ec04d78971f3cbdb0a60373
-
SHA512
9c1d65f52db90d67e0e37d03fa7d30fd605e0b86822a314c4974c7aeee45d5a74d3132f0f9acfb65fa85148e8d09b9aa97c7c96b875e4076370d95ae3bfb216f
-
SSDEEP
6144:i5tYTzqklVw910CIWrC9foCChVN6XCLWk6aMWgziMV1AXj16NYuLDuUcOibi5EBk:iUPTCBC9A/VIXCCkMWguMcj0vbd5E0/3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d331740a14a125be4e739d795aa1e70_NEIKI
Files
-
4d331740a14a125be4e739d795aa1e70_NEIKI.exe windows:5 windows x86 arch:x86
083195e88e98e46047e899f7b9baaab3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetProcAddress
VirtualAlloc
VirtualFree
VirtualProtect
user32
GetDC
advapi32
RegCloseKey
shell32
ShellExecuteW
ws2_32
gethostbyname
iphlpapi
GetAdaptersInfo
oleacc
LresultFromObject
gdi32
SaveDC
winspool.drv
OpenPrinterW
oleaut32
VariantClear
Sections
.text Size: 74KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 11KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 210KB - Virtual size: 250KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 6KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.RSCW Size: 27KB - Virtual size: 28KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE