Static task
static1
Behavioral task
behavioral1
Sample
026168186db1ddeef19911124998f540_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
026168186db1ddeef19911124998f540_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
026168186db1ddeef19911124998f540_NeikiAnalytics
-
Size
1.7MB
-
MD5
026168186db1ddeef19911124998f540
-
SHA1
b63da53e6b1a674a17cdaee36dc7ad465afbc755
-
SHA256
75a8eeac9dea9fe65fb0eabd9e35fca926ed59be2a9053d13d272644ea2b90e4
-
SHA512
4c1d1a5d8e66d1b663524c96c81beb0f5209c2e8ff0960588275088ce3b29a23d5b1bf65f22dc556e0961401ac82ee26745c952e4875a77ddc7ed403b0e0969a
-
SSDEEP
12288:GgirUaFFTHW5ktxsQ/ZCQAUMglfiSUfwlgKZ7TGNXg70lMbryl:GBrFLYkt1/sQMvSyk9dTRoMnk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 026168186db1ddeef19911124998f540_NeikiAnalytics
Files
-
026168186db1ddeef19911124998f540_NeikiAnalytics.exe windows:6 windows x86 arch:x86
3b41aaa7d89c3fee5eab02a63b668628
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WriteConsoleW
GetMaximumProcessorGroupCount
GetModuleHandleW
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapReAlloc
HeapSize
GetProcessHeap
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
GetLastError
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetFileType
GetStringTypeW
LCMapStringW
DecodePointer
user32
GetRegisteredRawInputDevices
gdi32
CreateSolidBrush
CreatePalette
CreateHatchBrush
CreateMetaFileW
shell32
Shell_GetCachedImageIndexW
SetCurrentProcessExplicitAppUserModelID
SHAssocEnumHandlersForProtocolByApplication
GetCurrentProcessExplicitAppUserModelID
SHLoadNonloadedIconOverlayIdentifiers
ord709
Sections
.text Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.frata Size: 1024B - Virtual size: 845B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sdfg Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 259KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 840B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ