Static task
static1
Behavioral task
behavioral1
Sample
d0d4f0ed0daca1d5ac72d8d53dd134c0_NEIKI.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
d0d4f0ed0daca1d5ac72d8d53dd134c0_NEIKI.dll
Resource
win10v2004-20240226-en
General
-
Target
d0d4f0ed0daca1d5ac72d8d53dd134c0_NEIKI
-
Size
56KB
-
MD5
d0d4f0ed0daca1d5ac72d8d53dd134c0
-
SHA1
9b4b1d84bfd5a80a3669c31a87b9d0837e07f624
-
SHA256
818a9060d9194e291e14a3dc228829a8ea28f9a006694fbf4f6772ac9923e8f0
-
SHA512
84f7d47d97fc2113e36f63e775254dbced33720ec2dac380d401c03b43ec85fe07b9240a25545ec6e383d87b1a871d78029af749a49ffe4adc96c60432763465
-
SSDEEP
768:fnTeH8wd2RVZjEfZzCBRvIho61beMojgSLP8o0gZijpZ:fnTeSRVZjEMvIho61OV4o0gZs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d0d4f0ed0daca1d5ac72d8d53dd134c0_NEIKI
Files
-
d0d4f0ed0daca1d5ac72d8d53dd134c0_NEIKI.dll windows:4 windows x86 arch:x86
6651be5b1f0d0c6637410617f98378fb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
MapViewOfFile
OpenFileMappingA
CreateFileMappingA
CloseHandle
UnmapViewOfFile
GetCurrentProcessId
CreateEventA
PulseEvent
OpenEventA
WaitForSingleObject
SetEnvironmentVariableA
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetCommandLineA
GetVersion
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
ExitProcess
TerminateProcess
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
HeapAlloc
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
RtlUnwind
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
InterlockedDecrement
InterlockedIncrement
CompareStringA
CompareStringW
user32
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
MessageBoxA
PostMessageA
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ