Static task
static1
Behavioral task
behavioral1
Sample
57fbb55d37de2d389c2497eea6de86e0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
57fbb55d37de2d389c2497eea6de86e0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
57fbb55d37de2d389c2497eea6de86e0_NeikiAnalytics
-
Size
824KB
-
MD5
57fbb55d37de2d389c2497eea6de86e0
-
SHA1
a19d3088e4e0603c61cd64e78262b9be53aa124a
-
SHA256
47593e9cddcc1546df5cfcbe10a58180322a5f86d8f9a9a1ad6f5c702d595878
-
SHA512
ee321c8313f432492067e30eadf89173cb52c0d28371898070c57776a9dfd5c633ce0cd767e332796c8d0f4ca2a8e7d0aad4cda2973247a9e808aba802733c4a
-
SSDEEP
6144:z4sZBOZdjEYTPXMhaMP/kFTA7OAGBOZdjEYTPXMhaMP/a:znANL8oq/kFTsOSNL8oq/a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 57fbb55d37de2d389c2497eea6de86e0_NeikiAnalytics
Files
-
57fbb55d37de2d389c2497eea6de86e0_NeikiAnalytics.exe windows:4 windows x86 arch:x86
5331ce77aa0d7f10da3e13b1a5022f58
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetModuleFileNameExA
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
mfc42
ord5778
ord5465
ord3511
ord5194
ord268
ord350
ord533
ord938
ord833
ord919
ord3810
ord5934
ord2438
ord1644
ord6407
ord2584
ord3654
ord5572
ord5641
ord5592
ord1081
ord911
ord4187
ord698
ord415
ord396
ord715
ord539
ord542
ord6569
ord802
ord1997
ord1567
ord798
ord964
ord3663
ord3616
ord3127
ord5651
ord2919
ord6282
ord6283
ord6874
ord923
ord354
ord5186
ord665
ord5773
ord5442
ord6385
ord1979
ord3811
ord551
ord2915
ord940
ord823
ord922
ord926
ord924
ord2614
ord860
ord5683
ord4277
ord858
ord4129
ord941
ord4202
ord2764
ord2818
ord535
ord537
ord1105
ord800
ord825
ord540
ord861
ord4220
msvcrt
wcslen
wcscmp
_controlfp
__set_app_type
strtol
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
?terminate@@YAXXZ
strncpy
time
srand
wcsstr
_mbscmp
_access
atoi
_mbsnbcpy
rand
_mbsicmp
__CxxFrameHandler
_CxxThrowException
_except_handler3
__p__fmode
kernel32
LocalAlloc
OutputDebugStringA
CreateMutexA
LocalFree
GetSystemDirectoryA
CreateSemaphoreA
CopyFileA
ReleaseSemaphore
GetVersionExA
SetFileAttributesA
DeleteFileA
ExitProcess
GetLastError
GetModuleHandleA
CreateToolhelp32Snapshot
Process32First
OpenProcess
GetPriorityClass
Process32Next
GetWindowsDirectoryA
TerminateProcess
Sleep
GetModuleFileNameA
SetEvent
WaitForSingleObject
CloseHandle
CreateEventA
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
FreeLibrary
OpenEventA
LockResource
MultiByteToWideChar
LoadLibraryExA
EnumResourceNamesA
EnumResourceLanguagesA
FindResourceExA
SizeofResource
LoadResource
GetStartupInfoA
user32
CreateMenu
wsprintfA
advapi32
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
shell32
ShellExecuteA
ole32
CoUninitialize
CoTaskMemFree
CoInitialize
CoCreateInstance
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 492KB - Virtual size: 489KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ