Static task
static1
Behavioral task
behavioral1
Sample
2fcb666924b6c16749a7438c7e156ce0_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2fcb666924b6c16749a7438c7e156ce0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
2fcb666924b6c16749a7438c7e156ce0_NeikiAnalytics
-
Size
724KB
-
MD5
2fcb666924b6c16749a7438c7e156ce0
-
SHA1
f113195e6d4594ae4bc4b776048d809452c50301
-
SHA256
cdc9442de9436da45a0620f5d236bf399885960602a9aff9261c7e693e40ba13
-
SHA512
381babc86a17de7bc9d77722765904dee332e962d069a1a0b3793d960bfd9d5e2cbdb684561502c1a3ea61485274743f9e43b74711588c5733a15ec7f1d4b2ce
-
SSDEEP
12288:E8V3hbBMXQ5Uc5G2AqUXTrVuFZ2PxzmjhsdwOUyxCHWynwKdTJ3w8N6p:3FhbBMXmUcI2AqOvVuK5zmfOUyxCHjwn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2fcb666924b6c16749a7438c7e156ce0_NeikiAnalytics
Files
-
2fcb666924b6c16749a7438c7e156ce0_NeikiAnalytics.exe windows:4 windows x86 arch:x86
e39b886c4f1637c3247b517b47723faf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
d3d8
Direct3DCreate8
dinput8
DirectInput8Create
winmm
timeGetTime
kernel32
GetModuleHandleA
GetProcAddress
LoadLibraryA
FreeLibrary
OutputDebugStringA
IsProcessorFeaturePresent
GetVersionExA
WriteFile
GetLastError
GetFileSize
MapViewOfFile
CreateFileMappingA
CreateFileA
CreateFileW
WideCharToMultiByte
CloseHandle
UnmapViewOfFile
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetOEMCP
GetCPInfo
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
SetStdHandle
FlushFileBuffers
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
HeapSize
RaiseException
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
ReadFile
GetFileType
GetStdHandle
SetHandleCount
SetFilePointer
GetCommandLineA
GetStartupInfoA
FileTimeToLocalFileTime
GetDriveTypeA
GetVersion
FileTimeToSystemTime
FindNextFileA
GetFullPathNameA
GetACP
CompareStringW
CompareStringA
SetEndOfFile
GetStringTypeW
HeapAlloc
DeleteFileA
HeapFree
GetTimeZoneInformation
GetSystemTimeAsFileTime
RtlUnwind
ExitProcess
TerminateProcess
GetCurrentProcess
SetEnvironmentVariableA
GetCurrentDirectoryA
SetCurrentDirectoryA
FindFirstFileA
GetStringTypeA
user32
ClipCursor
GetActiveWindow
GetCursorPos
GetClientRect
SetCursor
GetWindowLongA
GetClipCursor
GetWindowRect
SetWindowPos
SetCursorPos
LoadIconA
GetDC
AdjustWindowRectEx
MessageBoxA
DestroyWindow
UnregisterClassA
RegisterClassA
CreateWindowExA
EndDialog
ChangeDisplaySettingsA
ShowCursor
EnumDisplaySettingsA
PostQuitMessage
DefWindowProcA
PostMessageA
SetActiveWindow
ShowWindow
SetForegroundWindow
SetFocus
FindWindowExA
PeekMessageA
TranslateMessage
DispatchMessageA
advapi32
RegOpenKeyA
RegCloseKey
RegQueryValueExA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
Sections
.text Size: 600KB - Virtual size: 599KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 72KB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ