Behavioral task
behavioral1
Sample
9c8b2e84b1e8fcc15a75c995e392bec0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
9c8b2e84b1e8fcc15a75c995e392bec0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
9c8b2e84b1e8fcc15a75c995e392bec0_NeikiAnalytics
-
Size
1.0MB
-
MD5
9c8b2e84b1e8fcc15a75c995e392bec0
-
SHA1
6a94d3954736f23ee2697df4fa419e9048af254c
-
SHA256
5c3c99b15654f3a3738c26fa2bc8e609848fa5c4bd61772c5a21c15a6189d5e3
-
SHA512
724d7bead002ee04ec67066fdf12b44fa815f6159d570d488252e833286298ba3ec1ee3662a9361b086b263f787b7a25d2cb8fce4606d4f961781897b3d53853
-
SSDEEP
24576:tZNEsCVz5EStsN1UzKjTPRCZI1G41hi8BzMDhH:tSjC0zKjTP0C1k8B4DJ
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9c8b2e84b1e8fcc15a75c995e392bec0_NeikiAnalytics
Files
-
9c8b2e84b1e8fcc15a75c995e392bec0_NeikiAnalytics.exe windows:4 windows x86 arch:x86
0966551585abe34609911058de1d7d3d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFree
GetLastError
GetCurrentProcess
GetVersionExA
TerminateProcess
GetTempPathA
GetWindowsDirectoryA
lstrcpyA
GetSystemDirectoryA
lstrlenA
SetLastError
lstrcatA
GetTimeZoneInformation
GetVersion
SetErrorMode
lstrcpynA
GetCurrentThreadId
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
WaitForSingleObject
InterlockedIncrement
InterlockedDecrement
FlushFileBuffers
DeleteCriticalSection
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
GetCPInfo
GetOEMCP
RtlUnwind
GetSystemTime
RaiseException
GetACP
HeapSize
SetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetStartupInfoA
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
InterlockedExchange
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LCMapStringA
LoadLibraryA
GetProcAddress
FreeLibrary
GetModuleFileNameA
FindFirstFileA
RemoveDirectoryA
DeleteFileA
FindNextFileA
FindClose
GetFileSize
ReadFile
WriteFile
SetFilePointer
GetTickCount
GlobalAlloc
GlobalLock
GlobalUnlock
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
GetCommandLineA
GetModuleHandleA
CreateFileA
MultiByteToWideChar
DeviceIoControl
Wow64RevertWow64FsRedirection
WriteProcessMemory
VirtualQueryEx
ReadProcessMemory
WideCharToMultiByte
IsWow64Process
RtlMoveMemory
lstrcpyn
GetCurrentProcessId
Wow64DisableWow64FsRedirection
Process32Next
Process32First
CreateToolhelp32Snapshot
Sleep
LocalFree
LocalAlloc
MoveFileA
CreateDirectoryA
GetLocalTime
CloseHandle
CreateThread
shlwapi
PathFileExistsA
user32
DestroyWindow
LoadStringA
GetDlgCtrlID
GetMenuItemCount
SetWindowPos
SetFocus
GetWindowPlacement
IsIconic
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
DestroyMenu
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
SetWindowsHookExA
GetLastActivePopup
PostMessageA
PostQuitMessage
SetWindowTextA
SetForegroundWindow
GetForegroundWindow
IsWindowEnabled
EnableWindow
GetParent
GetWindow
PtInRect
GetWindowLongA
GetWindowTextA
FindWindowExA
SetWindowLongA
GetDlgItem
SystemParametersInfoA
GetDC
ReleaseDC
GetClassNameA
SendMessageA
GetWindowRect
GetSystemMetrics
UnhookWindowsHookEx
GrayStringA
GetWindowThreadProcessId
MessageBoxTimeoutA
MessageBoxA
wsprintfA
CloseClipboard
SetClipboardData
DrawTextA
TabbedTextOutA
ClientToScreen
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
EmptyClipboard
OpenClipboard
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
ModifyMenuA
SetMenuItemBitmaps
gdi32
GetClipBox
DeleteDC
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetObjectA
GetStockObject
SelectObject
GetDeviceCaps
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteObject
advapi32
DeleteService
ControlService
StartServiceA
CloseServiceHandle
OpenServiceA
CreateServiceA
OpenSCManagerA
CreateProcessWithTokenW
DuplicateTokenEx
LookupAccountSidA
GetTokenInformation
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegOpenCurrentUser
RegDeleteKeyA
psapi
EnumProcesses
ws2_32
select
recv
send
closesocket
WSAStartup
WSACleanup
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
shell32
SHGetSpecialFolderPathA
ShellExecuteA
comctl32
ord17
wininet
InternetCanonicalizeUrlA
InternetCrackUrlA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetConnectA
InternetSetOptionA
InternetOpenA
InternetCloseHandle
rasapi32
RasGetConnectStatusA
RasHangUpA
Sections
.text Size: 204KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 836KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 772B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ