Static task
static1
Behavioral task
behavioral1
Sample
8701556b68c5e24c0eb86f89286ea590_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8701556b68c5e24c0eb86f89286ea590_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
8701556b68c5e24c0eb86f89286ea590_NeikiAnalytics
-
Size
1.9MB
-
MD5
8701556b68c5e24c0eb86f89286ea590
-
SHA1
8980ec47b3479a5f8ac888c726f180eebeee4113
-
SHA256
656c09558366369799a5981d83bb5151296489876e0675f2fa2c63170c4e4c46
-
SHA512
0319c8838c4d38dd5b8fad8a4ff1a9141549ccecb3ceb35aab58371c8ee55d2bb9910688bf0814a5d1d3b418a1c449cbf868b100b3e4df565c1580da0ede1545
-
SSDEEP
49152:veNe9vMa+vKz9EPgwias8inkmqaMAjU6xonDivQ7ptSdqfviIB:xhw6Efias8inrqz6GZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8701556b68c5e24c0eb86f89286ea590_NeikiAnalytics
Files
-
8701556b68c5e24c0eb86f89286ea590_NeikiAnalytics.exe windows:4 windows x86 arch:x86
fbdccc5fc6882af34ad3b99c608b6ac6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
InitializeSecurityDescriptor
IsTextUnicode
OpenProcessToken
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
SetSecurityDescriptorDacl
comctl32
InitCommonControls
gdi32
CreateFontIndirectA
GetObjectA
GetStockObject
kernel32
CloseHandle
CreateDirectoryExW
CreateDirectoryW
CreateEventW
CreateFileW
CreatePipe
CreateProcessW
CreateThread
DeleteCriticalSection
DeleteFileW
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileW
FindNextFileW
FlushFileBuffers
FormatMessageW
GetCommandLineA
GetCommandLineW
GetCurrentDirectoryW
GetCurrentProcess
GetDiskFreeSpaceExW
GetEnvironmentVariableW
GetExitCodeProcess
GetFileAttributesExW
GetFileAttributesW
GetLastError
GetLocalTime
GetLocaleInfoW
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStartupInfoW
GetStdHandle
GetTempPathW
GetTickCount
GetUserDefaultLCID
GetVersionExA
InitializeCriticalSection
LeaveCriticalSection
LocalAlloc
LocalFree
MultiByteToWideChar
PeekNamedPipe
ReadFile
RemoveDirectoryW
SetEvent
SetFileAttributesW
SetStdHandle
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcmpA
lstrcmpW
lstrcpynA
lstrcpynW
lstrlenA
lstrlenW
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
calloc
free
fwrite
memcpy
memset
signal
vfprintf
shell32
CommandLineToArgvW
SHGetFolderPathA
user32
CreateWindowExA
CreateWindowExW
DefWindowProcA
DestroyWindow
DispatchMessageA
GetClientRect
GetMessageA
GetSystemMetrics
IsDialogMessageA
LoadCursorA
LoadIconA
LoadImageA
MessageBoxA
MessageBoxW
PostQuitMessage
RegisterClassExA
SendMessageA
SetFocus
SetForegroundWindow
SetWindowTextW
ShowWindow
TranslateMessage
UnregisterClassA
UpdateWindow
wvsprintfW
userenv
GetUserProfileDirectoryW
Sections
.text Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 196B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE