Static task
static1
Behavioral task
behavioral1
Sample
147d3a330d04f192913407c7f1a283f0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
147d3a330d04f192913407c7f1a283f0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
147d3a330d04f192913407c7f1a283f0_NeikiAnalytics
-
Size
1.3MB
-
MD5
147d3a330d04f192913407c7f1a283f0
-
SHA1
6faedda9a13384f909d7111b54e28c3fde1b7b0b
-
SHA256
771d603e5678f8de9e4de0ac9455123ed3965521cade378828b1a12d70485608
-
SHA512
c0190fbadc85eb4f5674d58d8e0ef460a99f7605c93dfc4643d6787cf0d39a17caa2a9293480b35283f3531225cc17edfc7dfa79347d12d72e637c310e9dac0c
-
SSDEEP
24576:xEP8Qfv3iSWSZZp9vNO/tWZp1gForeeSZhizi4uXcdmR1qDM/ugaWT2R:OP82ucfioreJZKi4us4R1qDM/uaT2R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 147d3a330d04f192913407c7f1a283f0_NeikiAnalytics
Files
-
147d3a330d04f192913407c7f1a283f0_NeikiAnalytics.exe windows:4 windows x86 arch:x86
a8b4b50f10ea7debc8fafa86e1029380
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
SHGetValueA
kernel32
GetCommandLineA
InterlockedExchange
lstrcpyA
lstrlenA
GetFileAttributesA
GetCurrentDirectoryA
GetModuleFileNameA
GetLastError
CreateDirectoryA
SetFileAttributesA
CloseHandle
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
CreateFileA
RtlUnwind
LoadLibraryA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
VirtualQuery
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetEndOfFile
HeapAlloc
HeapFree
ReadFile
SetFilePointer
GetFileType
WriteFile
GetModuleHandleA
GetStartupInfoA
HeapSize
GetVersionExA
GetACP
GetOEMCP
GetCPInfo
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
ExitProcess
GetProcAddress
TerminateProcess
GetCurrentProcess
SetHandleCount
GetStdHandle
SetStdHandle
user32
DialogBoxParamA
KillTimer
EndDialog
UpdateWindow
wsprintfA
MessageBoxA
GetDlgItem
GetWindowTextA
LoadStringA
SetWindowTextA
SendDlgItemMessageA
SendMessageA
SetTimer
shell32
SHGetSpecialFolderLocation
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
Sections
.text Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ