Static task
static1
Behavioral task
behavioral1
Sample
6990666d44560f0022d30f0ea97b9f80_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6990666d44560f0022d30f0ea97b9f80_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
6990666d44560f0022d30f0ea97b9f80_NeikiAnalytics
-
Size
2.5MB
-
MD5
6990666d44560f0022d30f0ea97b9f80
-
SHA1
47af03cc53ff39c55b856ac9114b758ea663a3df
-
SHA256
7146cf89448c8914c265c1f293731381f927ad294b1e533666cd9088bd0d9531
-
SHA512
dc4834f70cbfdab1a7f5c692c4a5829d3d5491b2476fa50ee8d0fdca9f609af492e8dd9cd1f0559ced479843446a813c5d42a7732aab9e47b7ee4b71480a96e8
-
SSDEEP
49152:VjtlRt9vmOVgggp6dnOxahUL6OsRLZKPh2kgxM6mXhsoXuRl++vIalMdPZCk6mAk:VjbxvugvO0T7bKPh2kgxM6mXhsoXuRlm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6990666d44560f0022d30f0ea97b9f80_NeikiAnalytics
Files
-
6990666d44560f0022d30f0ea97b9f80_NeikiAnalytics.exe windows:1 windows x86 arch:x86
142e11918bb4a353abef46eb6ed2db81
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
c60ascx
ASCII
c60basx
BASIC
c60clax
CLARION
c60db4x
DBASE4
c60dosx
DOS
c60olex
Cla$HookOle
OcxGetParam
OcxGetParamCount
OcxRegisterEventProc
OcxRegisterPropChange
OcxRegisterPropEdit
c60runx
Cla$ACCEPTED
Cla$ADDqueue
Cla$ADDqueuekey
Cla$ADDqueueptr
Cla$BEEP
Cla$BindE
Cla$BindG
Cla$BindP
Cla$BindV
Cla$CHANGE
Cla$CHOICE
Cla$CLEAR
Cla$clearstr
Cla$CLOCK
Cla$CLOSEwindow
Cla$code
Cla$comparestr
Cla$CREATE
Cla$DATE
Cla$DAY
Cla$DecAdd
Cla$DecDistinct
Cla$DecDistinctR
Cla$DecDivide
Cla$DecDivideR
Cla$DecMul
Cla$DecSub
Cla$DELETEqueue
Cla$DESTROY
Cla$DInt
Cla$DISABLE
Cla$DISPLAY
Cla$DISPOSEqueue
Cla$Dlongpower
Cla$DPopDec
Cla$DPopLong
Cla$DPopReal
Cla$DPushConstant
Cla$DPushDec
Cla$DPushLong
Cla$DPushReal
Cla$DStack2Stack
Cla$duplicate
Cla$ENABLE
Cla$EndEventLoop
Cla$EndEventLoops
Cla$ENDPAGE
Cla$ERRORCODE
Cla$Evaluate
Cla$EVENT
Cla$FIELD
Cla$FILEERRORCODE
Cla$FILEERRORMSG
Cla$FILE_ADDf
Cla$FILE_BUILDf
Cla$FILE_BYTES
Cla$FILE_CLOSE
Cla$FILE_CREATE
Cla$FILE_DELETE
CLA$FILE_DESTROY
Cla$FILE_EMPTY
Cla$FILE_GETfk
Cla$FILE_GETfl
Cla$FILE_GETflu
Cla$FILE_GET_PROPERTY
Cla$FILE_NAME
Cla$FILE_NEXT
Cla$FILE_OPEN
Cla$FILE_POINTERf
Cla$FILE_POSITIONf
Cla$FILE_POSITIONk
Cla$FILE_PREV
Cla$FILE_PUTf
Cla$FILE_RECORDSf
Cla$FILE_REGETf
Cla$FILE_RESETf
Cla$FILE_RESETk
Cla$FILE_SEND
Cla$FILE_SETf
Cla$FILE_SETfl
Cla$FILE_SETk
Cla$FILE_SETkk
Cla$FILE_SETkl
Cla$FILE_SET_PROPERTY
Cla$FILE_SHARE
Cla$FILE_WATCH
Cla$FREEqueue
Cla$FREEqueuea
Cla$freestr
Cla$FreeUfo
Cla$freewindow
Cla$GETINI
Cla$GetPropS
Cla$GETqueuekey
Cla$GETqueueptr
Cla$Group2Ufo
Cla$HALT
Cla$HIDE
Cla$init
Cla$INT
Cla$KEYCHAR
Cla$KEYCODE
Cla$loaddec
Cla$longtostr
Cla$MakeAString
Cla$Mem2Ufo
Cla$MessageBox
Cla$modulus
Cla$MONTH
Cla$NewCriticalSection
Cla$NewMutex
Cla$NEWqueue
Cla$OPENwindow
Cla$paopen
Cla$pmopen
Cla$POINTERqueue
Cla$PopBind
Cla$PopCString
Cla$PopReal
Cla$PopString
Cla$PopTemp
Cla$POPUP
Cla$POST
Cla$PRESSKEY
Cla$PRINTreport
Cla$propen
Cla$PushBind
Cla$PushCString
Cla$PushLong
Cla$PushPictDec
Cla$PushPictLong
Cla$PushReal
Cla$PushString
Cla$PushTemp
Cla$PUTINI
Cla$PUTqueue
Cla$PUTqueuekey
Cla$pwopen
Cla$realdistinct
Cla$RECORDSqueue
Cla$REJECTCODE
Cla$rterr
Cla$RUN
Cla$SELECT
Cla$SETCURSOR
Cla$SETKEYCODE
Cla$SETPOSITION
Cla$SetPropF
Cla$SetPropQ
Cla$SetPropS
Cla$SetPropV
Cla$SHORTPATH
Cla$SORTqueuekey
Cla$Stack2DStack
Cla$StackALL
Cla$StackCENTER
Cla$StackCLIP
Cla$StackCompareN
Cla$StackCompareNEQ
Cla$StackCompareR
Cla$StackConcat
Cla$StackConcatR
Cla$StackDEFORMAT
Cla$StackErrstr
Cla$StackHeap
Cla$StackINSTRING
Cla$StackLEFT
Cla$StackLen
Cla$StackLOWER
Cla$STACKpop
Cla$StackRIGHT
Cla$StackRotate
Cla$StackSUB
Cla$StackUPPER
Cla$StackVAL
Cla$START
Cla$START1
Cla$StartEventLoop
Cla$STATUSfile
Cla$STOP
Cla$storecstr
Cla$storedec
Cla$storestr
Cla$THREAD
Cla$THREAD_FILE
Cla$TODAY
Cla$UNHIDE
Cla$VIEW_SETvl
Cla$YEAR
Cla$YIELD
THR$GetInstance
VIEWDRIVER
Wsl$CloseDown
_exit
_free
_longjmp
_malloc
_memcpy
_setjmp
__sysinit
__sysstart
c60tpsx
TOPSPEED
clacom32
_ComGetc@4
_ComPutb@12
_DisplayPortError@4
_InitPort@20
_ResetPort@8
_SetFlowControl@16
_SetPort@8
user32
CallWindowProcA
FindWindowA
SystemParametersInfoA
wininet
HttpOpenRequestA
HttpSendRequestA
InternetConnectA
InternetOpenA
InternetReadFile
wsock32
send
Sections
.text Size: 289KB - Virtual size: 289KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 69KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cwtls Size: 7KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.cwdebug Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ