Static task
static1
Behavioral task
behavioral1
Sample
c011b9397b7e451ae76a72663a0a1a30_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c011b9397b7e451ae76a72663a0a1a30_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
c011b9397b7e451ae76a72663a0a1a30_NeikiAnalytics
-
Size
1.7MB
-
MD5
c011b9397b7e451ae76a72663a0a1a30
-
SHA1
5e463456d5def7742b758bdc4906c0d3adf702b8
-
SHA256
254d6e73a18ce98fa9175b68456bd70a0251e2834cbd79f6922a643f836debe9
-
SHA512
44b2cea837eed27847f4300fd4956c00242a89208195cf9712ac3d8827c8c97684176f5604a94f824fe3b6779456dbdfa381d88db8221d009c9728054d9c9d54
-
SSDEEP
24576:RkJAZHi+clx4tCQJSVAFja8i/RwQQmzgO67V3bYgR+zypEqxr2VSlLP:RkJAZHTclmJSVARa86xzW3xRoyqqxrT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c011b9397b7e451ae76a72663a0a1a30_NeikiAnalytics
Files
-
c011b9397b7e451ae76a72663a0a1a30_NeikiAnalytics.exe windows:4 windows x86 arch:x86
a8f69eb2cf9f30ea96961c86b4347282
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
msvcrt
memset
memcpy
_stricmp
strncmp
_strnicmp
strcmp
memmove
strlen
strcpy
strcat
strncpy
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
GetCurrentThreadId
GetTickCount
HeapAlloc
HeapFree
WriteFile
CloseHandle
CreateFileA
GetFileSize
ReadFile
SetFilePointer
InitializeCriticalSection
GetModuleFileNameA
GetCurrentProcess
DuplicateHandle
CreatePipe
GetStdHandle
CreateProcessA
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcessId
GetDriveTypeA
FindFirstFileA
FindClose
GetFileAttributesA
CreateDirectoryA
GetLastError
FindNextFileA
SetFileAttributesA
HeapReAlloc
comctl32
InitCommonControls
user32
MessageBoxA
GetWindowThreadProcessId
IsWindowVisible
IsWindowEnabled
GetForegroundWindow
EnableWindow
EnumWindows
shell32
ShellExecuteExA
ole32
CoInitialize
Sections
.code Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.NewSec Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.htext Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE