Static task
static1
Behavioral task
behavioral1
Sample
d0f32c1832790fae5de89451ccba7620_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d0f32c1832790fae5de89451ccba7620_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
d0f32c1832790fae5de89451ccba7620_NeikiAnalytics
-
Size
4.8MB
-
MD5
d0f32c1832790fae5de89451ccba7620
-
SHA1
b4d3524ccaa0674ac46c96be2ebfd1f41e0c9809
-
SHA256
3024c1ecbe6c563a53e98fd976d8d05756c4bf5f18548bdced3f2a8b890a8251
-
SHA512
831f0699e52d310c7d96e862e92e21a68756817c256f4b220ff4d43e024c08357092e9722d360676091fb8b4fc6bc35fc736131c8533943224135da367e88811
-
SSDEEP
98304:i/BWKG0gUHVIaptfYTZXKLmc14zAXCkaTj2FWP+QCvVrugxz:ipWCNoTZ6ZQA5EYWP+Qu5Bxz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d0f32c1832790fae5de89451ccba7620_NeikiAnalytics
Files
-
d0f32c1832790fae5de89451ccba7620_NeikiAnalytics.exe windows:4 windows x86 arch:x86
9fdba7ba406bfa5cc19c2f8d4161ffec
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExA
RegCreateKeyA
RegQueryValueExW
RegCloseKey
RegEnumValueW
RegQueryValueW
RegOpenKeyW
RegOpenKeyExW
user32
GetSystemMenu
UnregisterHotKey
DefFrameProcW
GetParent
SetCursor
UpdateWindow
GetSystemMetrics
CheckMenuItem
DrawFocusRect
GetCursorPos
GetDC
ReleaseDC
RegisterHotKey
SetWindowLongW
CreateDialogParamW
BeginDeferWindowPos
PostQuitMessage
BeginPaint
RegisterClipboardFormatW
EndDeferWindowPos
CloseClipboard
DestroyCursor
GetCapture
CallWindowProcW
RegisterClassW
PostMessageW
DrawIconEx
DrawFrameControl
MessageBoxW
PostThreadMessageW
DispatchMessageW
RedrawWindow
SetCursorPos
EnableMenuItem
GetMenuStringW
DefWindowProcW
MessageBeep
IsWindowEnabled
MapWindowPoints
CreateMenu
GetDlgItem
SystemParametersInfoW
GetWindowTextLengthW
GetForegroundWindow
SetForegroundWindow
SendMessageW
LoadCursorW
LoadBitmapW
LoadIconW
DefMDIChildProcW
ClientToScreen
TrackPopupMenu
WindowFromPoint
GetWindow
GetAsyncKeyState
CreatePopupMenu
GetActiveWindow
LoadImageW
DrawMenuBar
ShowWindow
VkKeyScanW
OpenClipboard
GetWindowDC
ExitWindowsEx
ShowCursor
UnregisterClassW
TranslateMessage
DestroyWindow
PtInRect
GetClassNameW
SetCapture
MoveWindow
UnionRect
PeekMessageW
EnableWindow
EndPaint
GetMessageW
GetSubMenu
AdjustWindowRectEx
ReleaseCapture
MsgWaitForMultipleObjects
ScreenToClient
LoadCursorFromFileW
DeferWindowPos
GetWindowTextW
SetWindowTextW
DestroyMenu
GetUpdateRect
CreateWindowExW
SetClipboardData
GetWindowLongW
GetKeyState
InvalidateRect
kernel32
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
ReadFile
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
SetStdHandle
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
MultiByteToWideChar
GetLastError
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetProcAddress
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetModuleFileNameA
GetModuleHandleA
WideCharToMultiByte
RtlUnwind
ExitProcess
GetVersion
GetCommandLineA
GetLocalTime
GetSystemTime
GetTimeZoneInformation
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
InitializeCriticalSection
CreateFileA
CreateFileMappingW
CreateFileW
SetFilePointer
MapViewOfFile
CloseHandle
WriteFile
UnmapViewOfFile
Sections
.text Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 416KB - Virtual size: 413KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ