Static task
static1
Behavioral task
behavioral1
Sample
11cfc53a6b70cb2bd9440a09f7e0b510_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
11cfc53a6b70cb2bd9440a09f7e0b510_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
11cfc53a6b70cb2bd9440a09f7e0b510_NeikiAnalytics
-
Size
84KB
-
MD5
11cfc53a6b70cb2bd9440a09f7e0b510
-
SHA1
f82bd786cc5dfc64b056f5083959b21f288b1ea3
-
SHA256
ad8d651b77aa60c49c7f374cf41ca5f56227752d2fdf6c65a4a5caba2a97aa13
-
SHA512
b0ede0ef4d35a6a8cd260dbfbb7147523e9def264a1990d976cd4a9dd057315974e6695024bb02e622114261150be4ff009e0e2109448ff02d93b43263d8efc7
-
SSDEEP
768:IsEQHecaqxfEb0xU5ohrkvnfJ62us2z4UgQ3IjFCEE6A7Qbx+A6pTWfcVeYJ1Wq7:Isf+XpJ2z5f3TQqOj4xmvqWobmLy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 11cfc53a6b70cb2bd9440a09f7e0b510_NeikiAnalytics
Files
-
11cfc53a6b70cb2bd9440a09f7e0b510_NeikiAnalytics.exe windows:4 windows x86 arch:x86
f81aac59b79a25984bfe74129451ddef
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strncpy
??3@YAXPAX@Z
strrchr
??2@YAPAXI@Z
_ftol
atoi
_CIfmod
modf
memmove
free
malloc
strncmp
sprintf
user32
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
MessageBoxA
SetPropA
GetPropA
RemovePropA
SetWindowRgn
SetClassLongA
FillRect
GetSysColor
IsIconic
IsZoomed
GetSystemMetrics
GetMenu
SetMenu
DrawMenuBar
RegisterWindowMessageA
PostMessageA
LoadCursorA
RegisterClassExA
TranslateAcceleratorA
CreateMenu
CreatePopupMenu
GetSystemMenu
LoadMenuA
DestroyMenu
AppendMenuA
GetMenuItemCount
InsertMenuA
SetMenuInfo
GetSubMenu
GetMenuItemID
CheckMenuRadioItem
EnableWindow
TrackPopupMenu
GetMenuStringA
GetMenuItemInfoA
GetMenuItemRect
GetMenuState
GetMenuInfo
GetMenuDefaultItem
MenuItemFromPoint
RemoveMenu
CheckMenuItem
SetMenuItemInfoA
SetMenuItemBitmaps
SetMenuDefaultItem
wsprintfA
SetWindowPos
MoveWindow
ScreenToClient
UpdateWindow
ValidateRect
InvalidateRect
GetWindowRect
GetFocus
GetClassNameA
GetDlgItem
GetClassLongA
CallNextHookEx
SetWindowsHookExA
CreateWindowExA
UnhookWindowsHookEx
SetWindowLongA
DestroyIcon
TrackMouseEvent
SetCursor
IsWindowEnabled
ShowWindow
IsWindowVisible
SetForegroundWindow
SetParent
DefMDIChildProcA
DefWindowProcA
DestroyWindow
GetClientRect
GetAsyncKeyState
CallWindowProcA
SendMessageA
GetAncestor
GetWindowLongA
SetFocus
GetNextDlgTabItem
GetParent
DispatchMessageA
TranslateMessage
IsDialogMessageA
IsWindow
GetMessageA
LoadIconA
kernel32
GetFileSize
RtlMoveMemory
lstrcpynA
LocalFree
GetCurrentThreadId
LocalAlloc
LocalSize
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
LCMapStringA
CreateFileA
GetModuleHandleA
ReadFile
CloseHandle
shell32
Shell_NotifyIconA
DragFinish
DragQueryFileA
DragAcceptFiles
gdi32
SelectObject
BitBlt
DeleteDC
GetObjectA
CreateCompatibleDC
CreateSolidBrush
CreatePatternBrush
CreateRoundRectRgn
SetTextColor
SetBkColor
GetStockObject
DeleteObject
StretchBlt
advapi32
RegSetValueExA
RegCreateKeyExA
RegCloseKey
Sections
.text Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE