Static task
static1
Behavioral task
behavioral1
Sample
1065005c1e4f2e65aaab7c6a4187a8b0_NeikiAnalytics.exe
Resource
win7-20240215-en
General
-
Target
1065005c1e4f2e65aaab7c6a4187a8b0_NeikiAnalytics
-
Size
276KB
-
MD5
1065005c1e4f2e65aaab7c6a4187a8b0
-
SHA1
7bcdb9505c6c13dffdf5e1ac7b8bd371a46ba627
-
SHA256
7ab3eb25abe219404418d6ab09c5da0780b1f1654320e25e2d217b0e01abb229
-
SHA512
e741c82159078d54347c96684aff6525ef1c2d48f71a16b77dde6ad06016c9ab74d3e3fd4a249453bf2339eb15e255927d7ceee03541d61031b5c09814684d3b
-
SSDEEP
6144:CE4rib+K6Zpa4C4jLvkjbtMjvpbYZ651NN+uBSTZ5D:ClibsZpa4Nkje9j2Yat
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1065005c1e4f2e65aaab7c6a4187a8b0_NeikiAnalytics
Files
-
1065005c1e4f2e65aaab7c6a4187a8b0_NeikiAnalytics.exe windows:4 windows x86 arch:x86
ef39d474ee88b9215814d74ee695b02b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
GetProcessHeap
VirtualAlloc
VirtualProtect
VirtualFree
GetProcAddress
LoadLibraryA
IsBadReadPtr
HeapFree
FreeLibrary
HeapReAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 236KB - Virtual size: 236KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ