Static task
static1
Behavioral task
behavioral1
Sample
51497f462059668de32895531e9a4490_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
51497f462059668de32895531e9a4490_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
51497f462059668de32895531e9a4490_NeikiAnalytics
-
Size
1.9MB
-
MD5
51497f462059668de32895531e9a4490
-
SHA1
ef3e1c4850a28c07fa39cd9277b5e617a62aa09b
-
SHA256
78dc86bcb91bbaefc9b8464d6f6c5aaba06da4b3886c3c1af3246a5db66f32cf
-
SHA512
d2733d88cf981fb336c57882b69e997713924bfc9a08b855416c22407aeaeb218bc0d0bf6b04445e4f9a2d900a830b9c22333d298ef86014346378700176a314
-
SSDEEP
49152:882fKm28RY2EbdFMzEb2FOhaesVPFUMfMtb9:YjRYOPF1fMtb9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 51497f462059668de32895531e9a4490_NeikiAnalytics
Files
-
51497f462059668de32895531e9a4490_NeikiAnalytics.exe windows:4 windows x86 arch:x86
d977673a182ee3b06fddc68aab5ff64b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetOpenFileNameA
GetSaveFileNameA
PrintDlgA
gdi32
Arc
BitBlt
CreateBitmap
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBitmap
CreateHatchBrush
CreatePalette
CreatePatternBrush
CreateRectRgn
CreateSolidBrush
DPtoLP
DeleteDC
DeleteObject
Ellipse
EndDoc
EndPage
ExtCreatePen
FloodFill
GetBitmapBits
GetClipRgn
GetCurrentObject
GetCurrentPositionEx
GetDIBits
GetDeviceCaps
GetObjectA
GetPixel
GetStockObject
GetSystemPaletteEntries
LPtoDP
LineTo
MoveToEx
Pie
Polygon
Polyline
RealizePalette
Rectangle
SelectClipRgn
SelectObject
SelectPalette
SetBitmapBits
SetBkColor
SetPixelV
SetROP2
SetTextColor
SetViewportOrgEx
StartDocA
StartPage
StretchBlt
TextOutA
kernel32
AddAtomA
CloseHandle
CreateEventA
CreateFileA
CreateMutexA
CreateSemaphoreA
CreateThread
DeleteCriticalSection
DuplicateHandle
EnterCriticalSection
FindAtomA
FormatMessageA
GetAtomNameA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetFileSize
GetHandleInformation
GetLastError
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
GetProcessAffinityMask
GetStartupInfoA
GetSystemTimeAsFileTime
GetThreadContext
GetThreadPriority
GetTickCount
GlobalAlloc
GlobalFree
GlobalLock
GlobalReAlloc
GlobalUnlock
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
LocalFree
MultiByteToWideChar
QueryPerformanceCounter
ReadFile
ReleaseMutex
ReleaseSemaphore
ResetEvent
ResumeThread
SetCriticalSectionSpinCount
SetEvent
SetFilePointer
SetLastError
SetProcessAffinityMask
SetThreadContext
SetThreadPriority
SetUnhandledExceptionFilter
Sleep
SuspendThread
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TryEnterCriticalSection
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
msvcrt
__dllonexit
__doserrno
__getmainargs
__initenv
__lconv_init
__mb_cur_max
__pioinfo
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_beginthreadex
_cexit
_endthreadex
_errno
_exit
_fdopen
_filelengthi64
_fileno
_fileno
_fmode
_fstat64
_ftime
_initterm
_iob
_lock
_lseeki64
_onexit
_read
_setjmp3
_snwprintf
_strnicmp
_unlock
_write
_write
abort
atoi
calloc
exit
fclose
fflush
fgetpos
fopen
fprintf
fputc
fputs
fread
free
fsetpos
fwprintf
fwrite
getc
getenv
getwc
isspace
iswctype
localeconv
longjmp
malloc
memchr
memcmp
memcpy
memmove
memset
printf
putc
putwc
raise
realloc
setlocale
setvbuf
signal
sprintf
strchr
strcmp
strcoll
strerror
strftime
strlen
strncmp
strxfrm
towlower
towupper
ungetc
ungetwc
vfprintf
wcscoll
wcscpy
wcsftime
wcslen
wcsxfrm
ole32
CreateStreamOnHGlobal
oleaut32
OleLoadPicture
user32
AppendMenuA
BeginPaint
CreateWindowExA
DefWindowProcA
DispatchMessageA
EndPaint
FillRect
GetDC
GetMessageA
GetSystemMenu
GetSystemMetrics
GetWindowLongA
InvalidateRect
LoadCursorA
MessageBoxA
MessageBoxW
PostQuitMessage
RegisterClassExA
ReleaseDC
SendMessageA
SetCursor
SetWindowLongA
ShowWindow
TranslateMessage
UnregisterClassA
UpdateWindow
ws2_32
WSAStartup
closesocket
connect
htons
inet_addr
send
socket
Sections
.text Size: 582KB - Virtual size: 582KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
/4 Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/19 Size: 392KB - Virtual size: 391KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/31 Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/45 Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/57 Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/70 Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/81 Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/92 Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ