Behavioral task
behavioral1
Sample
1b9af2d736e56b8e7155c185f5c03470_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1b9af2d736e56b8e7155c185f5c03470_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
1b9af2d736e56b8e7155c185f5c03470_NeikiAnalytics
-
Size
996KB
-
MD5
1b9af2d736e56b8e7155c185f5c03470
-
SHA1
4ad5ab7c3a887847b8df59ec71463f4050f216a7
-
SHA256
3fe6965db5cc7aa6d4aa71631bf007bb283542cba89c82986f06e8087d7768c7
-
SHA512
c3a011298ef5ae86ffac084d626eeae387f016aed315153a9e1621cc4653582cf6b2b2010ef6bfee2592b51f38d8df5c983923a9a2c3424cb2d482bd479dade5
-
SSDEEP
12288:gEQoShf3I9or6nxSezdCVr7NuHS/F60i6G4oFf1/P9B3/TIlGhhz5rfquZ3JuN6W:gDI9or6ce5CV9F6n6GrJPL3/T91WuXiR
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b9af2d736e56b8e7155c185f5c03470_NeikiAnalytics
Files
-
1b9af2d736e56b8e7155c185f5c03470_NeikiAnalytics.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_NO_BIND
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gtcl Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kxvu Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.psfx Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.oncez Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bsp Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ