Static task
static1
Behavioral task
behavioral1
Sample
4ff9161eb2dad41a03ec8ad9bdff1d80_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4ff9161eb2dad41a03ec8ad9bdff1d80_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
4ff9161eb2dad41a03ec8ad9bdff1d80_NeikiAnalytics
-
Size
1.3MB
-
MD5
4ff9161eb2dad41a03ec8ad9bdff1d80
-
SHA1
71103df8247a6e1acb7e17b0d751547e48b750f5
-
SHA256
fdb06a7da09ca36eafbde00a2be1005606e7f100dad9fbf9f090046f9153f441
-
SHA512
245b697935d5b1a3d2eb6c8c27daff347e06260c674ffc3e23a16b4285a30f585059a6b0ed117f7a509680738fe4e59d47b971f6f579ec4cfc95bccddb21770e
-
SSDEEP
24576:zs57gLwupFZpv/AAfbSl11Iu5uaHM5KanhN2I77/cKS6nUoe7pR9C8E:zs5I9LIQaHMfn+qzC7b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4ff9161eb2dad41a03ec8ad9bdff1d80_NeikiAnalytics
Files
-
4ff9161eb2dad41a03ec8ad9bdff1d80_NeikiAnalytics.exe windows:105 windows x64 arch:x64
d194900e0588810033fb98e73e7747d5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
kernel32
QueryPerformanceFrequency
GetSystemDirectoryA
FreeLibrary
GetModuleHandleA
MultiByteToWideChar
WideCharToMultiByte
SetLastError
FormatMessageW
MoveFileExA
WaitForSingleObjectEx
GetEnvironmentVariableA
GetCurrentProcessId
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
SleepEx
VerSetConditionMask
VerifyVersionInfoW
CreateFileA
GetFileSizeEx
GetDriveTypeW
CreateFileW
GetModuleHandleExW
ExitProcess
LoadLibraryExW
TlsFree
CreateToolhelp32Snapshot
TerminateProcess
VirtualAlloc
lstrlenW
GetCurrentProcess
VirtualFree
VirtualProtect
Process32First
GetModuleFileNameA
WriteConsoleW
TlsSetValue
TlsGetValue
TlsAlloc
GetFileInformationByHandle
EncodePointer
HeapSize
GetTimeZoneInformation
DeleteFileW
DeleteCriticalSection
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFullPathNameW
GetCurrentDirectoryW
SetEndOfFile
SetStdHandle
FlushFileBuffers
HeapReAlloc
GetFileAttributesExW
CreateProcessW
WaitForSingleObject
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
HeapFree
HeapAlloc
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
WriteFile
GetModuleFileNameW
SetFilePointerEx
FreeLibraryAndExitThread
ExitThread
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
GetTickCount
QueryPerformanceCounter
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetExitCodeProcess
AllocConsole
CreateProcessA
GetProcAddress
CloseHandle
Process32Next
LoadLibraryA
GetLastError
GetStringTypeW
Sleep
RaiseException
RtlPcToFileHeader
RtlUnwindEx
InitializeCriticalSectionAndSpinCount
RtlUnwind
CreateThread
FileTimeToSystemTime
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
SystemTimeToTzSpecificLocalTime
user32
GetWindowThreadProcessId
ShowWindow
MessageBoxA
EnumWindows
advapi32
CryptCreateHash
OpenProcessToken
LookupPrivilegeValueA
CryptEncrypt
CryptImportKey
CryptDestroyKey
CryptDestroyHash
CryptHashData
GetTokenInformation
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
AdjustTokenPrivileges
shell32
ShellExecuteExA
normaliz
IdnToAscii
IdnToUnicode
ws2_32
getsockopt
gethostname
ioctlsocket
getpeername
sendto
recvfrom
freeaddrinfo
getaddrinfo
recv
listen
htonl
getsockname
connect
bind
accept
select
__WSAFDIsSet
socket
htons
WSAIoctl
setsockopt
WSACleanup
WSAStartup
WSASetLastError
ntohs
WSAGetLastError
closesocket
WSAWaitForMultipleEvents
WSAResetEvent
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
send
wldap32
ord22
ord217
ord301
ord200
ord30
ord79
ord35
ord33
ord32
ord27
ord26
ord41
ord50
ord45
ord60
ord211
ord46
ord143
crypt32
CertFreeCertificateChain
CertGetCertificateChain
CertFreeCertificateChainEngine
CertCreateCertificateChainEngine
CryptQueryObject
CertGetNameStringA
CertFindExtension
CertAddCertificateContextToStore
CryptDecodeObjectEx
PFXImportCertStore
CryptStringToBinaryA
CertFreeCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertOpenStore
sensapi
IsDestinationReachableW
IsNetworkAlive
IsDestinationReachableA
avicap32
capCreateCaptureWindowA
bcrypt
BCryptGenRandom
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 188KB - Virtual size: 188KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 327B - Virtual size: 315B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ