Static task
static1
Behavioral task
behavioral1
Sample
be9fe3be9291e2fc7dda161c397896d0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
be9fe3be9291e2fc7dda161c397896d0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
be9fe3be9291e2fc7dda161c397896d0_NeikiAnalytics
-
Size
58KB
-
MD5
be9fe3be9291e2fc7dda161c397896d0
-
SHA1
65e266be6e27f05aa342a25f10abe80e888e9a37
-
SHA256
79b2d1f4c33e985ed15a57e06913badc9f37e9b1f50449e8b533f8ab95570d16
-
SHA512
0f4af6530063a33822fb19c441c8d402b0d48c8fdd419523cf3401fe271efcc5b17d9d016b6ad8378ccffd4233a1c8810acbad49e4032ee8857fb38f780a608b
-
SSDEEP
768:JKe7zUTWVlTVV0uIaOoRPmTPsED3VK2+ZtyOjgO4r9vFAg2rqB47KI628:JKe7zUm9FIaOHYTjipvF2SIV8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource be9fe3be9291e2fc7dda161c397896d0_NeikiAnalytics
Files
-
be9fe3be9291e2fc7dda161c397896d0_NeikiAnalytics.exe windows:5 windows x86 arch:x86
c626dccf7fb6f72d572fabe34daf0ccc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ModifyMenuA
RemoveMenu
EndDialog
SetWindowTextA
SetScrollInfo
CheckMenuItem
ReleaseDC
GetDC
MoveWindow
GetClientRect
EnableMenuItem
GetMenuItemID
DeferWindowPos
EndDeferWindowPos
TranslateAcceleratorA
SetMenuItemInfoA
LoadStringA
InsertMenuItemA
GetPropA
RemovePropA
SetPropA
ScrollWindow
CreateCursor
DestroyCursor
GetSubMenu
BeginDeferWindowPos
DestroyAcceleratorTable
ShowCursor
RegisterWindowMessageA
AppendMenuA
DragDetect
GetCapture
CreateDialogIndirectParamA
ReleaseCapture
FindWindowA
CreateAcceleratorTableA
CharUpperA
DrawTextExA
DialogBoxParamA
DrawEdge
kernel32
GetStartupInfoA
MultiByteToWideChar
lstrlen
MapViewOfFile
UnmapViewOfFile
lstrlenA
CloseHandle
GetModuleHandleA
GetProcAddress
CreateDirectoryA
ole32
CoInitialize
CoUninitialize
CoCreateInstanceEx
oleaut32
SysAllocStringLen
SysFreeString
msvcrt
_exit
_controlfp
_XcptFilter
exit
__p__acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ