Static task
static1
Behavioral task
behavioral1
Sample
52dd8530bd57683933ee47300eac1f10_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
52dd8530bd57683933ee47300eac1f10_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
52dd8530bd57683933ee47300eac1f10_NeikiAnalytics
-
Size
736KB
-
MD5
52dd8530bd57683933ee47300eac1f10
-
SHA1
75e055c8d27f9930662a98f356c98773027101d4
-
SHA256
22152c8c9afc1b9c6411ebce894f305d1801a41a960d53b2955aa98b69d51522
-
SHA512
d068afcec02a23208ece24ae9bbd194b9e6d443ba400425b9aef39bcc143f35301b70cec6991258b8861cb320216047df0e89979a5f58c7c9bf5dc186902d542
-
SSDEEP
12288:bYfsPJbBTpvRfRvxnF8bHJ8rV+D9p9P6hpK5CEW99w07KsaVERUOuYT+4q2yXHPu:b8sPJbBTpvRZvYbHyrYREp8CEWDwhSmW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 52dd8530bd57683933ee47300eac1f10_NeikiAnalytics
Files
-
52dd8530bd57683933ee47300eac1f10_NeikiAnalytics.exe windows:4 windows x64 arch:x64
2461dab271149e4d7d15017befbeb571
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegOpenKeyExA
RegQueryValueExA
kernel32
CloseHandle
CreateFileA
CreateProcessA
CreateSemaphoreA
DeleteCriticalSection
EnterCriticalSection
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetExitCodeProcess
GetFileAttributesA
GetFullPathNameA
GetLastError
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTempPathA
GetTickCount
GetTimeZoneInformation
GetVersionExA
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryW
MultiByteToWideChar
QueryPerformanceCounter
ReleaseSemaphore
RtlAddFunctionTable
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetHandleInformation
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
msvcrt
__C_specific_handler
__dllonexit
__getmainargs
__initenv
__iob_func
__lconv_init
__mb_cur_max
__set_app_type
__setusermatherr
_access
_acmdln
_amsg_exit
_cexit
_close
_dup
_errno
_findclose
_findfirst64
_findnext64
_fmode
_fstat64
_fullpath
_get_osfhandle
_initterm
_localtime64
_lock
_onexit
_open
_pipe
_read
_stat64
_stricmp
_strnicmp
_time64
_unlock
abort
asctime
atoi
bsearch
calloc
exit
fclose
ferror
fflush
fgetc
fgets
fopen
fputc
fputs
fread
free
freopen
fseek
ftell
fwrite
getc
getenv
isalnum
isalpha
iscntrl
islower
isprint
ispunct
isspace
isupper
isxdigit
localeconv
malloc
memcmp
memcpy
memmove
memset
putc
putchar
qsort
raise
realloc
remove
setlocale
signal
sprintf
strcat
strchr
strcmp
strcpy
strcspn
strerror
strlen
strncmp
strncpy
strpbrk
strrchr
strstr
strtol
strtoul
tolower
ungetc
wcslen
_write
_unlink
_strdup
_read
_putenv
_open
_isatty
_getpid
_fileno
_fdopen
_close
_access
user32
CharLowerBuffA
Sections
.text Size: 393KB - Virtual size: 393KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 152KB - Virtual size: 151KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 12KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE