Static task
static1
Behavioral task
behavioral1
Sample
d25fa79d16af84d3f61d66936f02ac90_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
d25fa79d16af84d3f61d66936f02ac90_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
d25fa79d16af84d3f61d66936f02ac90_NeikiAnalytics
-
Size
25KB
-
MD5
d25fa79d16af84d3f61d66936f02ac90
-
SHA1
46cad828fed51ddfd3b919a6f5e2b231b32a6a8f
-
SHA256
9f8a692f4795ea939d042c9914952b7c1782ab54d0f9c88c3fe4a60556be98a9
-
SHA512
713decadafb32aa60502bd91e25290354fc821abcd7c76bc4dbeddfed3edcf8a919d9cfbbccb84fe0cb6b74f08f4d3c3bd8c8a4cd41a5c398b2d12f1111abcdb
-
SSDEEP
384:0wznxkW5jElj3Jb7IdLEwcFq2jAiOCTJOcQTws61:lVE55/IqFq2s1EJO3j61
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d25fa79d16af84d3f61d66936f02ac90_NeikiAnalytics
Files
-
d25fa79d16af84d3f61d66936f02ac90_NeikiAnalytics.exe windows:5 windows x86 arch:x86
b858596be07193039212187010dc2e41
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetMessageA
DefWindowProcA
PostQuitMessage
LoadIconA
RegisterClassA
msacm32
acmStreamOpen
acmFilterChooseA
kernel32
GetModuleHandleA
GetProcAddress
CreateEventW
HeapCreate
HeapAlloc
ExitProcess
FreeLibrary
GetLastError
GlobalUnlock
GlobalLock
CloseHandle
DeleteCriticalSection
WaitForMultipleObjects
Sleep
InitializeCriticalSection
SetEvent
TryEnterCriticalSection
GetPrivateProfileIntW
GetPrivateProfileStringW
GetModuleHandleW
GetVolumeInformationW
lstrcpyW
Sections
.text Size: 512B - Virtual size: 82B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.code Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ