Static task
static1
Behavioral task
behavioral1
Sample
04d138588d7b926111035c7aa57942c0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
04d138588d7b926111035c7aa57942c0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
04d138588d7b926111035c7aa57942c0_NeikiAnalytics
-
Size
34KB
-
MD5
04d138588d7b926111035c7aa57942c0
-
SHA1
0fcf74c4b1ede7756fbf3592a7865483f5cc82b0
-
SHA256
d7576118f640382f382092baa912619c455bd685f83a3b003e9a7bad81a00752
-
SHA512
bfa88522db4adcaefd61bc02eb58b98e37d562dfdf9a289ba4cd47cd9dbb694ae287eac4aad4a562447e58cfdf8185a3f56ebed4aec5a51e3194d5e42988cf23
-
SSDEEP
768:hxe7zUTWVlTVV0uIaOVzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzt:hxe7zUm9FIaOv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04d138588d7b926111035c7aa57942c0_NeikiAnalytics
Files
-
04d138588d7b926111035c7aa57942c0_NeikiAnalytics.exe windows:5 windows x86 arch:x86
c626dccf7fb6f72d572fabe34daf0ccc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ModifyMenuA
RemoveMenu
EndDialog
SetWindowTextA
SetScrollInfo
CheckMenuItem
ReleaseDC
GetDC
MoveWindow
GetClientRect
EnableMenuItem
GetMenuItemID
DeferWindowPos
EndDeferWindowPos
TranslateAcceleratorA
SetMenuItemInfoA
LoadStringA
InsertMenuItemA
GetPropA
RemovePropA
SetPropA
ScrollWindow
CreateCursor
DestroyCursor
GetSubMenu
BeginDeferWindowPos
DestroyAcceleratorTable
ShowCursor
RegisterWindowMessageA
AppendMenuA
DragDetect
GetCapture
CreateDialogIndirectParamA
ReleaseCapture
FindWindowA
CreateAcceleratorTableA
CharUpperA
DrawTextExA
DialogBoxParamA
DrawEdge
kernel32
GetStartupInfoA
MultiByteToWideChar
lstrlen
MapViewOfFile
UnmapViewOfFile
lstrlenA
CloseHandle
GetModuleHandleA
GetProcAddress
CreateDirectoryA
ole32
CoInitialize
CoUninitialize
CoCreateInstanceEx
oleaut32
SysAllocStringLen
SysFreeString
msvcrt
_exit
_controlfp
_XcptFilter
exit
__p__acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.htext Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE