Static task
static1
Behavioral task
behavioral1
Sample
d02b17c702bd5a504a23cdea7821f3b0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
d02b17c702bd5a504a23cdea7821f3b0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
d02b17c702bd5a504a23cdea7821f3b0_NeikiAnalytics
-
Size
402KB
-
MD5
d02b17c702bd5a504a23cdea7821f3b0
-
SHA1
70d452cf532ed278c4e8eb4a9eb194facebaf3bd
-
SHA256
cad518108ac38bddb179100e5c09d33edbd836a8601ec4fb9519dc3d60c697f3
-
SHA512
31d7627c12ba87ebb1c40d1cfdc6ef9575d68c9c0411006928862f9c27c0a15b7bd4c94271e97e3eae6308a4f8614cf8c2c57ee0875184060f85c4ed337415c3
-
SSDEEP
6144:jEpmvTk1y8f9OP2QgaZm3VVKhx4hKi3Io46kbV7k5K6PQLlhJ36FQjGLvWX1vaa+:jEeT2yI52clVDB4B12636mrvaaaaa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d02b17c702bd5a504a23cdea7821f3b0_NeikiAnalytics
Files
-
d02b17c702bd5a504a23cdea7821f3b0_NeikiAnalytics.exe windows:4 windows x86 arch:x86
58da7289fc0e57e9969b549e468dee2a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetTempPathA
LoadLibraryA
GlobalFree
VirtualAlloc
GlobalAlloc
GetFileSize
GetModuleHandleW
LocalAlloc
WriteFile
CreateFileA
SetFilePointer
ReadFile
FindClose
GetLastError
FindNextFileA
FreeLibrary
EndUpdateResourceA
UpdateResourceA
SizeofResource
BeginUpdateResourceA
LockResource
LoadResource
MapViewOfFile
FlushViewOfFile
CreateFileMappingA
CopyFileA
FreeResource
FindResourceExA
Sleep
GetProcAddress
SetLastError
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
RtlUnwind
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
GetStringTypeW
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetVersion
GetCommandLineA
GetStartupInfoA
CreateMutexA
VirtualFree
GetProcessHeap
HeapAlloc
ExitProcess
CreateThread
CloseHandle
HeapFree
WaitForMultipleObjects
VirtualProtect
GetStdHandle
user32
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
GetDC
PostQuitMessage
EndPaint
DrawTextA
GetClientRect
BeginPaint
DefWindowProcA
RegisterClassExA
GetIconInfo
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
LoadAcceleratorsA
IsWindow
IsWindowVisible
DrawIcon
CopyImage
ReleaseDC
DestroyIcon
CreateIconIndirect
CreateDialogParamA
EndDialog
LoadStringA
DialogBoxParamA
DestroyWindow
LoadImageA
gdi32
CreatePen
SelectObject
DeleteObject
EnumObjects
CreateSolidBrush
CreateDCA
GetObjectA
GetDIBits
CreateCompatibleBitmap
Rectangle
ole32
CoUninitialize
CoInitialize
pdh
PdhCollectQueryData
PdhAddCounterA
PdhOpenQueryA
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 168KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 549KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sdata Size: 167KB - Virtual size: 167KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mss Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.msl Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ems Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ead Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.efx Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.exx Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE