Static task
static1
Behavioral task
behavioral1
Sample
61a6d8e134a9a2cc3adfca6597392920_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
61a6d8e134a9a2cc3adfca6597392920_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
61a6d8e134a9a2cc3adfca6597392920_NeikiAnalytics
-
Size
852KB
-
MD5
61a6d8e134a9a2cc3adfca6597392920
-
SHA1
738388c337538ea3f1142b1dfcb7c8e225d23a5c
-
SHA256
33a5621fe011eb7f9393f694567ad4dbce6bd425f5aff72d1a97bd922afb3224
-
SHA512
15a8a069a8a57afb005aab748ef0b012b43e8922539a56344c52a8ed5cfa865f342a9b5819ba2a586016c60982c2f6e50e72e37bcc6f2e6ebf384621cc72cdcf
-
SSDEEP
12288:J6CEWYEh8AymD0QVVvf26ZT6fe+qyVZiwsn5Yi6hYUujdnjQsXhn:J+WY2aeQfe+7UShejdjQsB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 61a6d8e134a9a2cc3adfca6597392920_NeikiAnalytics
Files
-
61a6d8e134a9a2cc3adfca6597392920_NeikiAnalytics.exe windows:5 windows x86 arch:x86
6f07232272c4788200318c891002b55a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
Imports
kernel32
LoadLibraryA
FormatMessageA
Sleep
WriteFile
FlushFileBuffers
SetFilePointer
CloseHandle
GetDriveTypeW
CreateDirectoryW
CreateFileW
InterlockedDecrement
GetProcAddress
GetLongPathNameW
OpenProcess
GetCurrentProcess
GetLastError
LoadResource
GetFileSize
ReadFile
FindClose
GetSystemInfo
lstrlenW
LoadLibraryW
GetModuleFileNameW
GetModuleHandleW
FindResourceExW
GetCurrentDirectoryW
RemoveDirectoryW
QueryDosDeviceW
SetFileAttributesW
GetFileAttributesW
DeleteFileW
FindFirstFileW
FindNextFileW
GetVersionExW
WideCharToMultiByte
GetUserDefaultLangID
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
Module32FirstW
Module32NextW
GetCurrentThreadId
WaitForSingleObject
CreateProcessW
CopyFileW
GetExitCodeProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
LocalFree
ReleaseMutex
RaiseException
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetStdHandle
GetModuleFileNameA
ExitProcess
GetModuleHandleExW
GetACP
HeapFree
HeapAlloc
CreateProcessA
GetFileAttributesExW
GetFileType
GetTimeZoneInformation
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStringTypeW
CreateThread
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
GetProcessHeap
HeapSize
HeapReAlloc
GetConsoleCP
GetConsoleMode
SetFilePointerEx
DecodePointer
WriteConsoleW
CreateMutexW
QueryPerformanceFrequency
GetTempPathW
DuplicateHandle
ReadConsoleW
MoveFileExW
CreatePipe
SetEndOfFile
EncodePointer
MultiByteToWideChar
ole32
CoInitializeEx
CoInitialize
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoSetProxyBlanket
oleaut32
VariantClear
SysFreeString
VariantInit
SysAllocString
shlwapi
PathRemoveFileSpecW
msi
ord113
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
user32
ShowWindow
DestroyWindow
CreateDialogParamW
GetDlgItem
SetDlgItemTextW
GetSystemMetrics
SendMessageW
PostMessageW
DispatchMessageW
GetDC
LoadIconW
SetWindowTextW
MessageBoxW
SetWindowsHookExW
UnhookWindowsHookEx
TranslateMessage
GetMessageW
GetWindowPlacement
IsWindow
CallNextHookEx
SetWindowPlacement
IsDialogMessageW
gdi32
GetTextExtentPoint32W
advapi32
RegOpenKeyExW
RegCloseKey
RegDeleteKeyW
RegEnumKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
shell32
SHGetFolderPathW
ord165
SHCreateDirectoryExW
Sections
.text Size: 409KB - Virtual size: 408KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 368B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 310KB - Virtual size: 310KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ