Static task
static1
Behavioral task
behavioral1
Sample
b58e199027b5f7f408b5f8c8af7ca950_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b58e199027b5f7f408b5f8c8af7ca950_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
b58e199027b5f7f408b5f8c8af7ca950_NeikiAnalytics
-
Size
1.0MB
-
MD5
b58e199027b5f7f408b5f8c8af7ca950
-
SHA1
b0c9d0ec23389974338e967877308906c651db68
-
SHA256
0b235575c2e463a659d93cb75e23f6d55ca59b76a08d04b840e7a0be3504613c
-
SHA512
75263166b80b7002f8d863ba2f91d89bdaf894d126f513fa03415bd38cac985db60e87279d8779ca38851f61891de60f688935b843e59b1e28567ad80d2dcf93
-
SSDEEP
24576:BbBoGnnjCGea7inOqUM3MSujN9y90t1m7+LfNJgYsUmtRwD84sucxo2cey:5jJeE4Wx+StU4Gy84Zcx4ey
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b58e199027b5f7f408b5f8c8af7ca950_NeikiAnalytics
Files
-
b58e199027b5f7f408b5f8c8af7ca950_NeikiAnalytics.exe windows:4 windows x86 arch:x86
8c61f5a8719cd7fa65798ecb6850cf52
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyA
RegCloseKey
user32
GetKeyboardType
DestroyWindow
MessageBoxA
TranslateMessage
ShowWindow
SetWindowTextA
SetWindowPlacement
SetTimer
SetFocus
SetDlgItemTextA
SendMessageA
SendDlgItemMessageA
PostMessageA
PeekMessageA
OemToCharA
MessageBoxA
LoadIconA
KillTimer
IsWindowVisible
IsWindow
IsDlgButtonChecked
GetWindowTextLengthA
GetWindowPlacement
GetDlgItemTextA
GetDlgItem
GetDialogBaseUnits
GetClassNameA
EnumChildWindows
EndDialog
EnableWindow
DispatchMessageA
DialogBoxParamA
DestroyWindow
CheckRadioButton
kernel32
GetACP
Sleep
VirtualFree
VirtualAlloc
GetCurrentThreadId
VirtualQuery
SetCurrentDirectoryA
GetStartupInfoA
GetLastError
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
lstrcmpiA
WriteFile
WinExec
SetFileTime
SetFilePointer
SetEnvironmentVariableA
ReadFile
MulDiv
LocalFileTimeToFileTime
GetVolumeInformationA
GetVersionExA
GetTickCount
GetTempFileNameA
GetShortPathNameA
GetModuleFileNameA
GetFullPathNameA
GetFileSize
GetFileAttributesA
GetDriveTypeA
GetCurrentDirectoryA
FreeLibrary
ExpandEnvironmentStringsA
DosDateTimeToFileTime
DeleteFileA
CreateFileA
CreateDirectoryA
CloseHandle
Beep
shell32
SHGetFileInfoA
ShellExecuteA
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
comctl32
InitCommonControls
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 1024B - Virtual size: 704B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 12KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ