Static task
static1
Behavioral task
behavioral1
Sample
6d8f1b20595965c6db98019256fd6ae0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6d8f1b20595965c6db98019256fd6ae0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
6d8f1b20595965c6db98019256fd6ae0_NeikiAnalytics
-
Size
68KB
-
MD5
6d8f1b20595965c6db98019256fd6ae0
-
SHA1
b41954b9270543f0f4d2d82cc6fa1d721456cdda
-
SHA256
ced175386e83b057511d024160c5898b8477b239f74ac0548509b334462c7053
-
SHA512
fd1888a4bd8bafef250ac1d66427085ac71a09e1ad849f91bf9fa0fbc3e3407daa89ba1e1c36e3c23c015dda17b535201a5374b20c48c312abbfa5ad6e8249c7
-
SSDEEP
768:JmPhTHA/TJivEhBWShjkLZ063bZUJoThLr2e88/zd3T6/3tpFFdLJJgBRrlYq5:Jm5sr8vuBWN8w2e8Mx3O/TFFdLJJgx5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6d8f1b20595965c6db98019256fd6ae0_NeikiAnalytics
Files
-
6d8f1b20595965c6db98019256fd6ae0_NeikiAnalytics.exe windows:4 windows x86 arch:x86
edba9e6366031b53bbdb7e17005a41a9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileAttributesA
GetFileAttributesA
CreateDirectoryA
DeleteFileA
RemoveDirectoryA
GetModuleFileNameA
GetCommandLineA
SetFilePointer
LeaveCriticalSection
WritePrivateProfileStringA
InitializeCriticalSection
LocalFree
FormatMessageA
FindResourceA
FindResourceExA
LoadResource
SizeofResource
LockResource
GetProcAddress
LoadLibraryA
FreeLibrary
FindFirstFileA
GetStartupInfoA
GetModuleHandleA
FindNextFileA
FindClose
GetPrivateProfileSectionA
WaitNamedPipeA
ReadFile
lstrcpynA
CreateProcessA
GetLastError
WaitForSingleObject
GetPrivateProfileStringA
CreateFileA
WriteFile
CloseHandle
EnterCriticalSection
GetVolumeInformationA
user32
TranslateMessage
GetMessageA
PeekMessageA
DialogBoxIndirectParamA
GetPropA
SetPropA
DispatchMessageA
CreateWindowExA
ShowWindow
LoadCursorA
GetWindowLongA
SetWindowLongA
DefWindowProcA
BeginPaint
EndPaint
UnregisterClassA
LookupIconIdFromDirectory
RemovePropA
SetWindowPos
GetWindowRect
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
LoadImageA
SendMessageA
IsWindow
LoadIconA
MessageBoxA
EndDialog
DestroyWindow
IsDialogMessageA
AppendMenuA
CreatePopupMenu
TrackPopupMenu
RegisterClassA
GetCursorPos
InsertMenuA
GetSubMenu
SetTimer
KillTimer
PostMessageA
CreateIconFromResource
LoadMenuIndirectA
GetDlgItemInt
IsDlgButtonChecked
SetDlgItemInt
CheckDlgButton
FindWindowA
SendDlgItemMessageA
EnableWindow
GetDlgItem
PostQuitMessage
gdi32
GetStockObject
advapi32
RegEnumKeyExA
RegEnumValueA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
CloseServiceHandle
QueryServiceStatusEx
shell32
Shell_NotifyIconA
wsock32
recv
WSACleanup
listen
accept
sendto
setsockopt
bind
send
shutdown
select
recvfrom
socket
connect
closesocket
gethostname
WSAGetLastError
ioctlsocket
gethostbyname
htons
WSAStartup
iphlpapi
GetAdaptersInfo
msvcrt
_onexit
__dllonexit
free
memmove
strtod
vsprintf
strstr
_CxxThrowException
strncpy
atoi
strchr
_purecall
??2@YAPAXI@Z
__CxxFrameHandler
sprintf
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_strcmpi
__set_app_type
_except_handler3
_controlfp
_itoa
??1type_info@@UAE@XZ
Sections
.text Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ