Static task
static1
Behavioral task
behavioral1
Sample
de0aab479cef35cd106a8934dc4e3510_NEIKI.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
de0aab479cef35cd106a8934dc4e3510_NEIKI.exe
Resource
win10v2004-20240508-en
General
-
Target
de0aab479cef35cd106a8934dc4e3510_NEIKI
-
Size
44KB
-
MD5
de0aab479cef35cd106a8934dc4e3510
-
SHA1
94eb6e02ddc56b6266fc3385adbb8b9434d6e98f
-
SHA256
5aefbc72443466532694f6f1197172e88c6c0b75cbf16ebeaebb5d1f5b233029
-
SHA512
3ff7a22c55849e33b1fe67f63ff5561228255d44d2ce4856540cb2f7fed806a297557211b44fc55af833055300d41f063e89afc3e9f547a6e5877721c41c18b9
-
SSDEEP
384:vcekJxxJvxWPQv9gC7gGjUunJVAxlibDYn0QCj2cQFN7Jn9scVyzIHGCmIYVS2T8:rkTTvxn/MkUumfMDY0vufsacw5ZU0o2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource de0aab479cef35cd106a8934dc4e3510_NEIKI
Files
-
de0aab479cef35cd106a8934dc4e3510_NEIKI.exe windows:4 windows x86 arch:x86
4cf73b07ec849067430648755119321a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
CloseHandle
TerminateProcess
WaitForSingleObject
GetProcAddress
LoadLibraryA
OpenProcess
WideCharToMultiByte
HeapFree
SetLastError
HeapAlloc
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
RtlUnwind
GetCommandLineA
GetVersion
ExitProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
GetLastError
FlushFileBuffers
SetFilePointer
MultiByteToWideChar
SetStdHandle
user32
PostMessageA
EnumWindows
GetWindowThreadProcessId
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE