Static task
static1
Behavioral task
behavioral1
Sample
52f3944d4e20834e84de11d16f471930_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
52f3944d4e20834e84de11d16f471930_NEIKI.exe
Resource
win10v2004-20240426-en
General
-
Target
52f3944d4e20834e84de11d16f471930_NEIKI
-
Size
592KB
-
MD5
52f3944d4e20834e84de11d16f471930
-
SHA1
d383f4b4080bc302334fdcf82cf038f3844f33ce
-
SHA256
72f43ec3f9105642e766a37e1a1fd3e15e04e87145e90d9ae1a33e8ae504e1bf
-
SHA512
14dd2462ec45092f351f90ef62f24d1125d333ac834862b3746186dbd5dd062338ab2f6a2cedc4af146b0626221290f6a8730a9ce4bf335711cfdf000b1fa0de
-
SSDEEP
12288:qTmPYOXgv+3ToWmYvthaElKT/46LM+mH3tuFKDiMiykF:qTAXgv+3TFm4TaaKT/46LB23cgDTN4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 52f3944d4e20834e84de11d16f471930_NEIKI
Files
-
52f3944d4e20834e84de11d16f471930_NEIKI.exe windows:5 windows x86 arch:x86
951d9659720c15a9821c1a3b1a6b643a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFix
GetFileSize
FindFirstFileW
WriteConsoleInputW
WriteConsoleOutputCharacterW
BuildCommDCBAndTimeoutsA
DeleteVolumeMountPointA
InterlockedIncrement
GetCommState
InterlockedDecrement
GetNamedPipeHandleStateA
AddConsoleAliasW
MoveFileWithProgressA
GetModuleHandleW
LocalFlags
GetPrivateProfileStringW
ReadConsoleW
GetWindowsDirectoryA
GetCommandLineA
CreateActCtxW
GlobalAlloc
LoadLibraryW
TerminateThread
ReadConsoleInputA
InterlockedPopEntrySList
GlobalFlags
GetConsoleAliasW
SetSystemPowerState
ReplaceFileW
GetTimeZoneInformation
CreateFileW
GetTempPathW
DeactivateActCtx
GetLargestConsoleWindowSize
GetConsoleOutputCP
GetLastError
SetLastError
GetProcAddress
VerLanguageNameW
GetProcessId
OpenWaitableTimerW
GetConsoleScreenBufferInfo
AddAtomW
GlobalGetAtomNameW
FoldStringW
GlobalFindAtomW
GetModuleHandleA
GetProcessShutdownParameters
GetProcessAffinityMask
WriteProfileStringW
RequestWakeupLatency
GetWindowsDirectoryW
GetVolumeNameForVolumeMountPointW
OpenFileMappingA
GetVolumeInformationW
WriteConsoleW
CloseHandle
SetFilePointer
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
ExitProcess
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
IsProcessorFeaturePresent
HeapCreate
WriteFile
GetStdHandle
GetModuleFileNameW
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetStdHandle
user32
CharToOemBuffW
CharUpperW
Sections
.text Size: 495KB - Virtual size: 495KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ