Static task
static1
Behavioral task
behavioral1
Sample
b773de4281217048021da6d3656ce570_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
b773de4281217048021da6d3656ce570_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
b773de4281217048021da6d3656ce570_NeikiAnalytics
-
Size
61KB
-
MD5
b773de4281217048021da6d3656ce570
-
SHA1
e735e30ceaa3f24e6c5355ffa2506e89735a7a27
-
SHA256
bdfde108ae04181f7610a7200fe8222e59f7d8f36432ee5839ec4d6f1053f1b6
-
SHA512
7f3bcadbfca23ac44f0e89e0bf6de186b3ee15914188f3b498a354e13cd447acc53f5838344c4e9f57053274996174e80ac83a9e5af41ced3aee48b59271d798
-
SSDEEP
768:8kKwg48kchivhilIFU+22gF9YjnD/lKDXIvC/H5PsJ8k04IHkcpBHg7U3fdiZFt4:o4yhivEl/sUDeC/H+J8RkcpBAIqx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b773de4281217048021da6d3656ce570_NeikiAnalytics
Files
-
b773de4281217048021da6d3656ce570_NeikiAnalytics.exe windows:4 windows x64 arch:x64
4558625cc90c43c8ea3c0538bd2c87b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CloseHandle
CreateFileA
CreateProcessA
DeleteCriticalSection
EnterCriticalSection
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetExitCodeProcess
GetFullPathNameA
GetLastError
GetModuleHandleW
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTempPathA
GetTickCount
GetTimeZoneInformation
GetVersionExA
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
MultiByteToWideChar
QueryPerformanceCounter
RtlAddFunctionTable
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetHandleInformation
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
msvcrt
__C_specific_handler
___lc_codepage_func
__dllonexit
__getmainargs
__initenv
__iob_func
__lconv_init
__mb_cur_max
__set_app_type
__setusermatherr
_access
_acmdln
_amsg_exit
_cexit
_close
_dup
_errno
_fmode
_get_osfhandle
_initterm
_lock
_onexit
_open
_pipe
_read
_stat64
_unlock
abort
calloc
exit
fclose
fopen
fprintf
fputc
free
fwrite
getenv
localeconv
malloc
memcpy
memmove
memset
qsort
realloc
remove
signal
strcat
strchr
strcmp
strcpy
strerror
strlen
strncmp
strncpy
strrchr
tolower
vfprintf
wcslen
_strdup
_open
_getpid
_fdopen
_close
_access
user32
CharLowerBuffA
Sections
.text Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 5KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE