Static task
static1
Behavioral task
behavioral1
Sample
3d248f9d4083f71946baae6fb4c08cd0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3d248f9d4083f71946baae6fb4c08cd0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
3d248f9d4083f71946baae6fb4c08cd0_NeikiAnalytics
-
Size
110KB
-
MD5
3d248f9d4083f71946baae6fb4c08cd0
-
SHA1
a3dac2a1bce52652bbb8ac17b1a67ddc863bcfd1
-
SHA256
ef609587e219d45fa1d72b4375eb7629242e70244194102f59345e37feee8046
-
SHA512
55f77e3cb867dd9e0afea5b89c3f6e5128ec5b4a92294c7d4ef89b5299459b86bd44040e025cbe519960cabbb2a05c51e78aae7141f7748de18a77fa7cc5b8c0
-
SSDEEP
3072:lha3hsjazCShBb1mEqwU4RtI4ZxjS329gBZUzY1LH5MQNW:iARPTGeEk1LH5Lo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d248f9d4083f71946baae6fb4c08cd0_NeikiAnalytics
Files
-
3d248f9d4083f71946baae6fb4c08cd0_NeikiAnalytics.exe windows:5 windows x86 arch:x86
e4a544d5efc750d99aef16a71aa27336
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
DbgPrint
NtAcceptConnectPort
NtClose
NtCompleteConnectPort
NtCreateFile
NtCreatePort
NtFlushBuffersFile
NtListenPort
NtQueryInformationFile
NtQuerySystemTime
NtReadFile
NtReplyWaitReceivePort
NtSetInformationFile
NtWriteFile
RtlAcquireResourceExclusive
RtlAcquireResourceShared
RtlAllocateHeap
RtlAnsiStringToUnicodeString
RtlAssert
RtlCompareMemory
RtlCopyUnicodeString
RtlDeleteResource
RtlDosPathNameToNtPathName_U
RtlFillMemoryUlong
RtlFreeAnsiString
RtlFreeHeap
RtlFreeUnicodeString
RtlInitUnicodeString
RtlInitializeResource
RtlReleaseResource
RtlSecondsSince1970ToTime
RtlTimeToSecondsSince1970
RtlTimeToTimeFields
RtlUnicodeStringToAnsiString
advapi32
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegSetValueExW
RegisterServiceCtrlHandlerExW
SetServiceStatus
StartServiceCtrlDispatcherW
kernel32
CloseHandle
CreateThread
DeleteCriticalSection
EnterCriticalSection
ExpandEnvironmentStringsW
GetComputerNameW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDriveTypeW
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetSystemTimeAsFileTime
GetSystemWindowsDirectoryW
GetTickCount
GetVersionExW
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
QueryPerformanceCounter
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
msvcrt
__dllonexit
__lconv_init
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_amsg_exit
_cexit
_fmode
_fpreset
_initterm
_iob
_lock
_onexit
_unlock
_vsnwprintf
_wcmdln
_wcsicmp
abort
calloc
exit
fprintf
free
fwrite
malloc
memmove
memset
signal
strncmp
vfprintf
wcscpy
wcslen
rpcrt4
NdrServerCall2
RpcMgmtStopServerListening
RpcServerListen
RpcServerRegisterIf
RpcServerUseProtseqEpW
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 840B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rossym Size: 56KB - Virtual size: 55KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ