Static task
static1
Behavioral task
behavioral1
Sample
8b0dd1a86110b7da89419ec9c63d42e0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8b0dd1a86110b7da89419ec9c63d42e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
8b0dd1a86110b7da89419ec9c63d42e0_NeikiAnalytics
-
Size
27KB
-
MD5
8b0dd1a86110b7da89419ec9c63d42e0
-
SHA1
ebfeca8b045f5cbb70bafa31f5e748bed6662174
-
SHA256
60fe3db05fe2f92c6a6cbe4a938ef3a81d0ba53223e5d61c47c336799b625043
-
SHA512
3f9a014fe9e4dc449f52e5151173b44addb31744723c1e04c9b312d3f12d6d057641b9b7e68e881ede8d6505fc2b8b87306a7ffc70a1b6bbb36a55c41cde4dd4
-
SSDEEP
384:6hsKewgzkVTF0VDRT3qcg666666666RJ70uIabjbt3TUArYQW9E1y:hKe7zUTWVlTVV0uIaOUYF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8b0dd1a86110b7da89419ec9c63d42e0_NeikiAnalytics
Files
-
8b0dd1a86110b7da89419ec9c63d42e0_NeikiAnalytics.exe windows:5 windows x86 arch:x86
c626dccf7fb6f72d572fabe34daf0ccc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ModifyMenuA
RemoveMenu
EndDialog
SetWindowTextA
SetScrollInfo
CheckMenuItem
ReleaseDC
GetDC
MoveWindow
GetClientRect
EnableMenuItem
GetMenuItemID
DeferWindowPos
EndDeferWindowPos
TranslateAcceleratorA
SetMenuItemInfoA
LoadStringA
InsertMenuItemA
GetPropA
RemovePropA
SetPropA
ScrollWindow
CreateCursor
DestroyCursor
GetSubMenu
BeginDeferWindowPos
DestroyAcceleratorTable
ShowCursor
RegisterWindowMessageA
AppendMenuA
DragDetect
GetCapture
CreateDialogIndirectParamA
ReleaseCapture
FindWindowA
CreateAcceleratorTableA
CharUpperA
DrawTextExA
DialogBoxParamA
DrawEdge
kernel32
GetStartupInfoA
MultiByteToWideChar
lstrlen
MapViewOfFile
UnmapViewOfFile
lstrlenA
CloseHandle
GetModuleHandleA
GetProcAddress
CreateDirectoryA
ole32
CoInitialize
CoUninitialize
CoCreateInstanceEx
oleaut32
SysAllocStringLen
SysFreeString
msvcrt
_exit
_controlfp
_XcptFilter
exit
__p__acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.htext Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE