Static task
static1
Behavioral task
behavioral1
Sample
5510d7003fb8f65466cfa9964ec28c50_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5510d7003fb8f65466cfa9964ec28c50_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
5510d7003fb8f65466cfa9964ec28c50_NeikiAnalytics
-
Size
1.9MB
-
MD5
5510d7003fb8f65466cfa9964ec28c50
-
SHA1
8b7d36e260992441997253f54a09740e5f6b096c
-
SHA256
ba88a7f323fa68246b99509f639d75ad2e3556f810616dc2c5f5738917524e0d
-
SHA512
cd47cf33c908c420f0fe440b60c31a129990633d4fe437ff40d532870e5d4b299aba0acb75f9c7614eadbd016b123b4239bb99112dc8c639947626aabc288761
-
SSDEEP
49152:veNBcMga+JTkzV/9bwIafX/f0gAiSSAXTEpUNxobyK7YvNlK6PfcehJ:JeKc/KIaf/f0gzSZ22
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5510d7003fb8f65466cfa9964ec28c50_NeikiAnalytics
Files
-
5510d7003fb8f65466cfa9964ec28c50_NeikiAnalytics.exe windows:4 windows x86 arch:x86
fbdccc5fc6882af34ad3b99c608b6ac6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
InitializeSecurityDescriptor
IsTextUnicode
OpenProcessToken
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
SetSecurityDescriptorDacl
comctl32
InitCommonControls
gdi32
CreateFontIndirectA
GetObjectA
GetStockObject
kernel32
CloseHandle
CreateDirectoryExW
CreateDirectoryW
CreateEventW
CreateFileW
CreatePipe
CreateProcessW
CreateThread
DeleteCriticalSection
DeleteFileW
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileW
FindNextFileW
FlushFileBuffers
FormatMessageW
GetCommandLineA
GetCommandLineW
GetCurrentDirectoryW
GetCurrentProcess
GetDiskFreeSpaceExW
GetEnvironmentVariableW
GetExitCodeProcess
GetFileAttributesExW
GetFileAttributesW
GetLastError
GetLocalTime
GetLocaleInfoW
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStartupInfoW
GetStdHandle
GetTempPathW
GetTickCount
GetUserDefaultLCID
GetVersionExA
InitializeCriticalSection
LeaveCriticalSection
LocalAlloc
LocalFree
MultiByteToWideChar
PeekNamedPipe
ReadFile
RemoveDirectoryW
SetEvent
SetFileAttributesW
SetStdHandle
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcmpA
lstrcmpW
lstrcpynA
lstrcpynW
lstrlenA
lstrlenW
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
calloc
free
fwrite
memcpy
memset
signal
vfprintf
shell32
CommandLineToArgvW
SHGetFolderPathA
user32
CreateWindowExA
CreateWindowExW
DefWindowProcA
DestroyWindow
DispatchMessageA
GetClientRect
GetMessageA
GetSystemMetrics
IsDialogMessageA
LoadCursorA
LoadIconA
LoadImageA
MessageBoxA
MessageBoxW
PostQuitMessage
RegisterClassExA
SendMessageA
SetFocus
SetForegroundWindow
SetWindowTextW
ShowWindow
TranslateMessage
UnregisterClassA
UpdateWindow
wvsprintfW
userenv
GetUserProfileDirectoryW
Sections
.text Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 196B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE