Static task
static1
Behavioral task
behavioral1
Sample
6ee4631b935f78fe525104e83a4f2d50_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6ee4631b935f78fe525104e83a4f2d50_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
6ee4631b935f78fe525104e83a4f2d50_NeikiAnalytics
-
Size
88KB
-
MD5
6ee4631b935f78fe525104e83a4f2d50
-
SHA1
285b563fa99b14bce47d50a1d59c46bd91a4d4e1
-
SHA256
8f0ef289459114bc0c60c389636d1ac9da9fc3bf1be430dd6cdb79a1a7d0d97c
-
SHA512
58deea397a3d0f5130387e7866222bbd64f1d5b965835e16bc448016e87a7b072f36a1b56968b6dc257add1f97e2a4be434ae6f5f23da3e6568e4de9276b9e5a
-
SSDEEP
1536:UYJoQJL63riV/TOm/UbMTuqjhONPHUhKN2RNPTaG0D9:UYJoQJL63riV/igUbMCqlONPHUKIRNP6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6ee4631b935f78fe525104e83a4f2d50_NeikiAnalytics
Files
-
6ee4631b935f78fe525104e83a4f2d50_NeikiAnalytics.exe windows:4 windows x86 arch:x86
a2a1d7a73f0fc61a80a444801abdfc1a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringW
LCMapStringA
GetFullPathNameA
FindFirstFileA
GetDriveTypeA
WritePrivateProfileStringA
FileTimeToSystemTime
FindClose
GetCurrentDirectoryA
DeleteFileA
HeapReAlloc
SetEndOfFile
GetVersionExA
WideCharToMultiByte
GetTempPathA
GetModuleFileNameA
Sleep
MultiByteToWideChar
FileTimeToLocalFileTime
SetCurrentDirectoryA
GetLastError
CreateDirectoryA
HeapFree
ExitProcess
TerminateProcess
GetCurrentProcess
HeapAlloc
MoveFileA
GetCommandLineA
GetVersion
CloseHandle
HeapCreate
GetStringTypeA
GetStringTypeW
SetFilePointer
SetHandleCount
GetFileType
GetStdHandle
GetStartupInfoA
ReadFile
FlushFileBuffers
WriteFile
GetFileAttributesA
RtlUnwind
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetACP
GetOEMCP
SetStdHandle
CreateFileA
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetProcAddress
LoadLibraryA
GetTimeZoneInformation
shell32
SHGetPathFromIDList
SHGetSpecialFolderLocation
SHGetMalloc
FindExecutableA
FindExecutableW
user32
GetWindowTextA
EnumWindows
ole32
CoInitialize
CoCreateInstance
advapi32
RegCreateKeyExA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegQueryInfoKeyA
RegCloseKey
RegSetValueExA
Sections
.text Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ