Static task
static1
Behavioral task
behavioral1
Sample
769700c840c7081084585d8432332e80_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
769700c840c7081084585d8432332e80_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
769700c840c7081084585d8432332e80_NeikiAnalytics
-
Size
35KB
-
MD5
769700c840c7081084585d8432332e80
-
SHA1
52cf7214ddcde6904371223dfcbfd0e0f89f997d
-
SHA256
d4e8577d67330436fbca0e4046ef9af26de9cf52e011db87c21b72919d9b0e63
-
SHA512
cc72fdb263a216e04b63855eda9816f56ec20367fba0780e43358169a808454fcc2d0448a397a410b827776c5eb8788f6b44f7eb3a73c0311e827921d2228a02
-
SSDEEP
384:6hsNawgzkVTF0VDRT3qcg666666666RJ70uIabjbt3TUAiYQW9EqbG5:hNa7zUTWVlTVV0uIaOZYzG5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 769700c840c7081084585d8432332e80_NeikiAnalytics
Files
-
769700c840c7081084585d8432332e80_NeikiAnalytics.exe windows:5 windows x86 arch:x86
c626dccf7fb6f72d572fabe34daf0ccc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ModifyMenuA
RemoveMenu
EndDialog
SetWindowTextA
SetScrollInfo
CheckMenuItem
ReleaseDC
GetDC
MoveWindow
GetClientRect
EnableMenuItem
GetMenuItemID
DeferWindowPos
EndDeferWindowPos
TranslateAcceleratorA
SetMenuItemInfoA
LoadStringA
InsertMenuItemA
GetPropA
RemovePropA
SetPropA
ScrollWindow
CreateCursor
DestroyCursor
GetSubMenu
BeginDeferWindowPos
DestroyAcceleratorTable
ShowCursor
RegisterWindowMessageA
AppendMenuA
DragDetect
GetCapture
CreateDialogIndirectParamA
ReleaseCapture
FindWindowA
CreateAcceleratorTableA
CharUpperA
DrawTextExA
DialogBoxParamA
DrawEdge
kernel32
GetStartupInfoA
MultiByteToWideChar
lstrlen
MapViewOfFile
UnmapViewOfFile
lstrlenA
CloseHandle
GetModuleHandleA
GetProcAddress
CreateDirectoryA
ole32
CoInitialize
CoUninitialize
CoCreateInstanceEx
oleaut32
SysAllocStringLen
SysFreeString
msvcrt
_exit
_controlfp
_XcptFilter
exit
__p__acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.htext Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE