Static task
static1
Behavioral task
behavioral1
Sample
561249c68cdf7ce4b011b61a9ba37060_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
561249c68cdf7ce4b011b61a9ba37060_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
561249c68cdf7ce4b011b61a9ba37060_NeikiAnalytics
-
Size
204KB
-
MD5
561249c68cdf7ce4b011b61a9ba37060
-
SHA1
46c98c0d0357094b379d696ba75f5ea9e2178363
-
SHA256
70ba557d062df625ae1340d096cc3ecd4a8f530682a3857c4602d964f4760ed6
-
SHA512
8e84063a22702b6236cee7cb38e368b476426720741440f1e376f069cbb280894d425ac6cd5ca6081a3beda5f0c2d7035f4b319ba2702d3f6249c10005ec3a1a
-
SSDEEP
3072:a5u7yT4TVbkuRaX1w71jnRkCoyJTarYWbV+HOFxg+z1WxJsqWkoyjOowUVl/TlAQ:aLexkuRaX41xoyJV65gzyZko+uc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 561249c68cdf7ce4b011b61a9ba37060_NeikiAnalytics
Files
-
561249c68cdf7ce4b011b61a9ba37060_NeikiAnalytics.exe windows:4 windows x86 arch:x86
add9e90fe8cc1a6d600a60e22be53bf7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExW
lstrcat
CompareFileTime
SetEvent
GetTempPathA
CopyFileExA
GlobalDeleteAtom
CopyFileA
LocalFree
CopyFileExW
ExitProcess
ExpandEnvironmentStringsA
LoadLibraryA
GetLogicalDriveStringsW
GetCommandLineA
IsValidLocale
SetPriorityClass
GetThreadPriority
GetWindowsDirectoryW
GetTempFileNameA
GetDateFormatA
SetThreadPriority
EnumCalendarInfoW
GetNumberFormatW
MultiByteToWideChar
OpenMutexW
GetFileAttributesW
GetSystemDefaultLCID
ExpandEnvironmentStringsW
GetProcAddress
GetLogicalDriveStringsA
lstrcpynW
GetLogicalDrives
GetCurrentDirectoryA
IsBadReadPtr
GetStringTypeA
user32
SetFocus
RegisterClassExW
SetTimer
CharLowerA
ShowWindow
MessageBoxW
CopyImage
LoadImageA
GetClassLongA
RegisterClassExA
PostMessageW
SetParent
GetDlgItemTextA
DefWindowProcA
GetClientRect
SendMessageW
DefFrameProcA
EnumDesktopsA
SetForegroundWindow
InvalidateRect
CheckDlgButton
LoadMenuIndirectA
GetWindowTextLengthA
SetWindowTextW
GetDC
LoadBitmapA
SendDlgItemMessageA
DefWindowProcW
SetDlgItemTextA
SendDlgItemMessageW
ChildWindowFromPoint
DestroyIcon
ArrangeIconicWindows
DrawTextA
CreateDialogIndirectParamA
DefDlgProcW
CharUpperA
CharPrevW
GetScrollPos
UpdateLayeredWindow
CallWindowProcA
GetDC
SetWindowRgn
gdi32
CreateRoundRectRgn
ResetDCW
Arc
CreatePen
CreateColorSpaceW
GetTextExtentPointA
GetPath
OffsetClipRgn
RectInRegion
advapi32
RegRestoreKeyW
RegDeleteKeyA
RegSaveKeyA
RegReplaceKeyW
RegReplaceKeyA
RegOpenKeyExA
RegFlushKey
shell32
SHCreateDirectoryExW
ShellExecuteExW
ExtractAssociatedIconExW
DuplicateIcon
SHGetDataFromIDListA
StrChrA
SHGetFileInfoA
StrChrIW
ExtractAssociatedIconA
shlwapi
UrlCombineA
PathMakeSystemFolderA
UrlUnescapeW
SHRegSetUSValueA
SHCreateThread
PathAppendA
PathCombineW
PathIsLFNFileSpecA
PathSetDlgItemPathW
StrToInt64ExA
SHCreateStreamOnFileW
StrCSpnIW
ColorRGBToHLS
SHRegGetBoolUSValueW
oleaut32
VarUI4FromUI1
VarIdiv
VarCyFromUI1
VarDateFromUI2
VarI8FromI2
VarR4CmpR8
VarNumFromParseNum
opengl32
glGetTexImage
glRectsv
crypt32
CryptSIPPutSignedDataMsg
CryptEnumKeyIdentifierProperties
Sections
.pGCC Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.XJy Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.TvKn Size: 3KB - Virtual size: 472KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CA Size: 4KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 117KB - Virtual size: 327KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ylLMGt Size: 512B - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Z Size: 1KB - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 758B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ