Static task
static1
Behavioral task
behavioral1
Sample
dbd65af6c743116c382cb31836764070_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
dbd65af6c743116c382cb31836764070_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
dbd65af6c743116c382cb31836764070_NeikiAnalytics
-
Size
672KB
-
MD5
dbd65af6c743116c382cb31836764070
-
SHA1
347d3c531ce81ce1a03777993cd1eb5606d26336
-
SHA256
4bdfdbc59f18f1045f65b6ca34bda9e79cff77f84fdceb3a64753631f79e8c73
-
SHA512
1b7c1a024bc321c70ad12f7b2da6b6b05ea4194cfbab8dda82d5897d1ab9591cce40d4cfd74c945456a42d76991ed6d67bfd49d820993d71765202bacee31906
-
SSDEEP
6144:BUzNQdnAgIPGSkoM+AjW55Mmt13tO9++MCiC28T52TYL26C9T2+ZiMPVm:azisjM+LtXt9T2+IMPVm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dbd65af6c743116c382cb31836764070_NeikiAnalytics
Files
-
dbd65af6c743116c382cb31836764070_NeikiAnalytics.exe windows:4 windows x86 arch:x86
4960bbf165c1f32fff00a01cf2ec9fa5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
netapi32
Netbios
mfc42
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord825
ord815
ord3571
ord641
ord800
ord656
ord692
ord609
ord2514
ord2621
ord1134
ord3663
ord3626
ord2414
ord3610
ord4644
ord1771
ord6366
ord2413
ord2024
ord4217
ord2576
ord4397
ord3352
ord3577
ord2575
ord3574
ord2574
ord6055
ord1776
ord4396
ord5290
ord3402
ord3572
ord5265
ord4376
ord4853
ord4998
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord3798
ord3081
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord4627
ord4425
ord3597
ord860
ord1146
ord1168
ord567
ord540
ord324
ord2302
ord4234
ord537
ord535
ord5572
ord2915
ord6215
ord858
ord2818
ord690
ord5207
ord1576
ord939
ord941
ord5890
ord6199
ord3092
ord6217
ord4148
ord4299
ord6197
ord6380
ord4287
ord4710
ord2379
ord755
ord470
ord5280
ord2937
ord6112
ord1793
ord4275
ord5875
ord283
ord3089
ord4476
ord823
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord2725
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord4673
ord4837
ord389
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_except_handler3
__CxxFrameHandler
atoi
_setmbcp
_access
_CxxThrowException
wcslen
_mbscmp
atol
?terminate@@YAXXZ
_mbsstr
__dllonexit
_exit
??1type_info@@UAE@XZ
_onexit
kernel32
WinExec
InterlockedDecrement
LocalFree
GetTempPathA
GetModuleHandleA
GetStartupInfoA
FindFirstFileA
CreateFileA
ReleaseMutex
GetLastError
CreateMutexA
GetLocalTime
WideCharToMultiByte
lstrlenA
WriteFile
MultiByteToWideChar
CloseHandle
user32
EnableWindow
KillTimer
InvalidateRect
LoadIconA
SetTimer
SendMessageA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
advapi32
RegQueryValueA
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
shell32
ShellExecuteExA
ShellExecuteA
comctl32
_TrackMouseEvent
ole32
OleRun
CoInitialize
CoCreateInstance
oleaut32
VariantClear
SysFreeString
SysAllocString
GetErrorInfo
wininet
InternetOpenA
HttpQueryInfoA
InternetReadFileExA
InternetCloseHandle
InternetOpenUrlA
Sections
.text Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 628KB - Virtual size: 624KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ