Static task
static1
Behavioral task
behavioral1
Sample
4bf90a805afde00d31014a72291b2580_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4bf90a805afde00d31014a72291b2580_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
4bf90a805afde00d31014a72291b2580_NeikiAnalytics
-
Size
2.0MB
-
MD5
4bf90a805afde00d31014a72291b2580
-
SHA1
26d4a5e2347a5f77e712d88b7ab04f35f64acc96
-
SHA256
77fa8cb7d1c705ba7290b5a708920788e7674ec9fe263155fe1ba8aa13a71b29
-
SHA512
4af23e92455773709fc442a1ad9afa3f83e39bccb553d62957cafdfe358cddaafd95f463e0981c8f5b7fd9f1f7bbc4ddee841273c48146f4a7b2b2c295fe5a0d
-
SSDEEP
49152:t4udRcm0njKUgjg/hQSsJ/vHzcOu3jo0J2Zvuw:tpb0n80sJAnTh4Ew
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4bf90a805afde00d31014a72291b2580_NeikiAnalytics
Files
-
4bf90a805afde00d31014a72291b2580_NeikiAnalytics.exe windows:4 windows x86 arch:x86
bd42b1f88b355586da3757a049acb762
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
CreateProcessA
lstrcmpA
lstrcatA
lstrcpyA
CreateDirectoryA
lstrlenA
DeleteFileA
GetTempFileNameA
GetTempPathA
CloseHandle
SetFilePointer
CreateFileA
GetModuleFileNameA
WriteFile
InitializeCriticalSection
GetStartupInfoA
GetModuleHandleA
ole32
CoInitialize
msvcrt
memset
??3@YAXPAX@Z
??2@YAPAXI@Z
calloc
free
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ