Static task
static1
Behavioral task
behavioral1
Sample
840f0fe613cb15ee28b9534df6074c90_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
840f0fe613cb15ee28b9534df6074c90_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
840f0fe613cb15ee28b9534df6074c90_NeikiAnalytics
-
Size
312KB
-
MD5
840f0fe613cb15ee28b9534df6074c90
-
SHA1
3fc6f3ba902c86ef4fd72563bf3250ed7d833a8b
-
SHA256
c9c7c1378a5487b659e4bb0849f2943fad8cd22651565bd9c9b03fe7ce210132
-
SHA512
37bac9fa0c433ebc2fa93315f0f8a9711df7b1dd6bdf76207fbe01ec9d9a16cadd0e6612848b78b558640d5e4b945bcf0cde536e9eb01eee14ed353db14ce49c
-
SSDEEP
6144:Am7UvTlIpr1f+XqO5aOmSGFDbeOjLPmUWgFA:Z0TlIB1f+55SpNPmUbFA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 840f0fe613cb15ee28b9534df6074c90_NeikiAnalytics
Files
-
840f0fe613cb15ee28b9534df6074c90_NeikiAnalytics.exe windows:4 windows x86 arch:x86
e14d8ab77a7e29f6cd12e014eaa81a38
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord187
ord588
MethCallEngine
ord516
ord517
ord518
ord665
ord669
ord520
ord709
ord631
ord632
ord526
EVENT_SINK_AddRef
ord527
ord528
DllFunctionCall
ord564
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord607
ord608
ord717
ProcCallEngine
ord535
ord537
ord644
ord645
ord681
ord578
ord100
ord579
ord616
ord617
ord618
ord619
Sections
.text Size: 284KB - Virtual size: 282KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE