Static task
static1
Behavioral task
behavioral1
Sample
8001b2115730633fa0d215e85b80b5a0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8001b2115730633fa0d215e85b80b5a0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
8001b2115730633fa0d215e85b80b5a0_NeikiAnalytics
-
Size
1.5MB
-
MD5
8001b2115730633fa0d215e85b80b5a0
-
SHA1
a46ad041e35dfc676cc9525f1de60fe0051a6f7f
-
SHA256
29dff7836ffd48e964305d5f7eda5e8740f82b6c9e107590237e5cbfd48beaf6
-
SHA512
b4ff1738d5f166c07954d5fedd0aa64067e4db18f0801e3099731f70802af32df22b34f003c7f70d81d259c8b4f57df7458c672356ad7a4a988c3a7dc0c01d95
-
SSDEEP
24576:KSnMljWpgzBmuRsJvfx/wuyuXL8AtSOS:pnoWpuBmuRsvp/wupL88y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8001b2115730633fa0d215e85b80b5a0_NeikiAnalytics
Files
-
8001b2115730633fa0d215e85b80b5a0_NeikiAnalytics.exe windows:6 windows x86 arch:x86
f0e3910c82a7c25528d23e4ac5f3533b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SwitchToThread
Sleep
GetCurrentProcessId
CloseHandle
DuplicateHandle
GetCurrentProcess
UnmapViewOfFile
LocalFree
MapViewOfFileEx
CreateFileA
GetSystemInfo
GetProcAddress
GetModuleHandleA
GetModuleHandleW
VirtualProtect
CreateFileW
FormatMessageA
CreateFileMappingA
GetLastError
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
MultiByteToWideChar
GetStringTypeW
LCMapStringW
GetLocaleInfoW
GetCPInfo
InitializeSListHead
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
RtlUnwind
InterlockedPushEntrySList
RaiseException
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
HeapFree
GetFileType
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapAlloc
ReadFile
SetFilePointerEx
ReadConsoleW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
SetStdHandle
HeapSize
WriteConsoleW
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
Sections
.text Size: 134KB - Virtual size: 134KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.kx Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pp Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.lfd Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 752B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ