Static task
static1
Behavioral task
behavioral1
Sample
9167eda49f91df7663443353a15805d0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9167eda49f91df7663443353a15805d0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
9167eda49f91df7663443353a15805d0_NeikiAnalytics
-
Size
5.4MB
-
MD5
9167eda49f91df7663443353a15805d0
-
SHA1
32e9a58718b45fd5044313d58dbed16aa4368ca6
-
SHA256
e089041a41b3b02f19e07adfa7863613038a19352b966114890aae644b003c9a
-
SHA512
b3d1e45ea954bf041aa4e024a907e43309b13a1f5555a85b6430008a0c9f0fc907fe2306bf02f7011b8ad24b14a585f04e2e9eaee7fee43e31e67e833c5c1ecb
-
SSDEEP
98304:4t0tCt0tWt0tPt0tCt0tWt0tPt0tCt0tWt0t:2qUqwqFqUqwqFqUqwq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9167eda49f91df7663443353a15805d0_NeikiAnalytics
Files
-
9167eda49f91df7663443353a15805d0_NeikiAnalytics.exe windows:5 windows x86 arch:x86
67da311f512756fb05cebee42551193f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
BaseCheckAppcompatCache
ClearCommBreak
CloseConsoleHandle
CommConfigDialogW
CreateActCtxA
CreateDirectoryW
CreateEventA
CreateFileA
CreateFileMappingW
CreateProcessA
CreateProcessW
DebugActiveProcess
DebugSetProcessKillOnExit
DecodeSystemPointer
DefineDosDeviceW
DeleteFileA
DeleteFileW
DeleteVolumeMountPointW
DnsHostnameToComputerNameW
DosDateTimeToFileTime
EnumCalendarInfoW
EnumResourceTypesA
EnumSystemLanguageGroupsA
EnumerateLocalComputerNamesA
EraseTape
ExtendVirtualBuffer
FindAtomA
FindFirstFileW
FindFirstVolumeMountPointW
FindFirstVolumeW
FindNextVolumeMountPointW
FindResourceExW
FreeUserPhysicalPages
FreeVirtualBuffer
GetBinaryType
GetCPInfo
GetCommMask
GetComputerNameA
GetComputerNameExA
GetConsoleAliasExesA
GetConsoleAliasesLengthA
GetConsoleAliasesW
GetConsoleCommandHistoryW
GetConsoleNlsMode
GetDevicePowerState
GetDiskFreeSpaceA
GetDiskFreeSpaceExW
GetDriveTypeA
GetEnvironmentStrings
GetExpandedNameA
GetFileAttributesA
GetFileAttributesExA
GetFileSize
GetHandleContext
GetLogicalDriveStringsW
GetMailslotInfo
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleExA
GetNamedPipeInfo
GetNativeSystemInfo
GetNumaAvailableMemory
GetNumaNodeProcessorMask
GetPrivateProfileIntW
GetPrivateProfileSectionNamesW
GetProcAddress
GetProcessAffinityMask
GetProcessHeaps
GetProcessVersion
GetProfileSectionW
GetStdHandle
GetStringTypeA
GetStringTypeExW
GetStringTypeW
GetSystemDirectoryA
GetSystemTimes
GetSystemWow64DirectoryA
GetTapePosition
GetThreadIOPendingFlag
GetThreadPriority
GetThreadSelectorEntry
GetWindowsDirectoryA
GlobalSize
Heap32ListFirst
HeapAlloc
HeapSummary
HeapUnlock
HeapUsage
HeapWalk
InitAtomTable
InitializeSListHead
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LocalFlags
LocalHandle
Module32First
MoveFileW
NlsConvertIntegerToString
OpenEventA
OpenFileMappingW
OpenThread
ProcessIdToSessionId
PulseEvent
RaiseException
RegisterConsoleIME
RegisterConsoleOS2
RegisterWaitForInputIdle
ReleaseActCtx
RemoveLocalAlternateComputerNameA
RestoreLastError
SearchPathA
SearchPathW
SetCommBreak
SetComputerNameA
SetConsoleCtrlHandler
SetConsoleOutputCP
SetConsoleTitleA
SetCurrentDirectoryW
SetFileTime
SetLastConsoleEventActive
SetMailslotInfo
SetPriorityClass
SetProcessShutdownParameters
SetSystemTime
SetVolumeLabelA
SignalObjectAndWait
SystemTimeToFileTime
Thread32First
TlsSetValue
Toolhelp32ReadProcessMemory
TransactNamedPipe
TransmitCommChar
UpdateResourceW
VerLanguageNameA
WaitForSingleObjectEx
WaitNamedPipeA
WriteFileGather
WritePrivateProfileStringW
WriteProfileStringA
WriteProfileStringW
_lopen
lstrcmp
lstrcmpi
lstrlenA
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ