Static task
static1
Behavioral task
behavioral1
Sample
04bc02228aec12a3af5e787298bed9f0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
04bc02228aec12a3af5e787298bed9f0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
04bc02228aec12a3af5e787298bed9f0_NeikiAnalytics
-
Size
262KB
-
MD5
04bc02228aec12a3af5e787298bed9f0
-
SHA1
4cd58b90e1fec8e93bb11008b8d44da2cfaadf1e
-
SHA256
86f140cd357277e26523def121a941fce04121774eb223e00de2f457a71c595f
-
SHA512
0c4e70d8fd850b238476362a29edeea0e143de6bb11ae3357c15df41a7fc225034371b0273f9a59de740a799a28b805acaccae75f0add65d971d164ad41ed7d1
-
SSDEEP
6144:RIpIg3ehlPrJYRtcTyrjJ9kTygGS8ASNrqo+o3EIz8YX:RhgUlPqcnTlGFPNeuow
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04bc02228aec12a3af5e787298bed9f0_NeikiAnalytics
Files
-
04bc02228aec12a3af5e787298bed9f0_NeikiAnalytics.exe windows:4 windows x86 arch:x86
3eedd4912ab7974bb3f7b4c7cb1340bb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStdHandle
DeleteCriticalSection
EnterCriticalSection
FreeEnvironmentStringsW
VirtualFree
GetEnvironmentStringsW
HeapAlloc
LoadLibraryA
GetStartupInfoA
TlsAlloc
GetCommandLineA
GetThreadPriority
GetEnvironmentStrings
HeapDestroy
InterlockedExchange
GetTickCount
GetVersion
GetModuleHandleA
TlsFree
GetCommandLineW
SetLastError
MultiByteToWideChar
GetModuleFileNameA
SetHandleCount
EnumResourceLanguagesW
GetCurrentThreadId
TlsSetValue
InitializeCriticalSection
GetProcAddress
GetLastError
WriteFile
HeapFree
FreeEnvironmentStringsA
LeaveCriticalSection
FlushInstructionCache
IsBadWritePtr
VirtualQuery
GetStartupInfoW
TlsGetValue
GetSystemTimeAsFileTime
HeapCreate
GetCurrentProcessId
GetModuleFileNameW
UnhandledExceptionFilter
HeapReAlloc
RtlUnwind
ExitProcess
GetFileType
GetCurrentThread
VirtualAlloc
TerminateProcess
QueryPerformanceCounter
GetCurrentProcess
shell32
FindExecutableW
SHGetDiskFreeSpaceA
SHGetSpecialFolderPathA
SHFileOperationA
SheChangeDirExW
SheSetCurDrive
SHBrowseForFolderW
SHGetFileInfoA
DoEnvironmentSubstA
SHGetDesktopFolder
SHGetNewLinkInfo
SHGetDataFromIDListA
SHGetMalloc
RealShellExecuteExW
InternalExtractIconListW
SHLoadInProc
DragQueryFileAorW
advapi32
RegSaveKeyW
LogonUserW
RegSetValueA
RegEnumKeyA
LookupPrivilegeNameA
CryptImportKey
CreateServiceA
CryptDuplicateKey
RegNotifyChangeKeyValue
RegEnumKeyW
CryptAcquireContextW
LookupPrivilegeValueW
RegConnectRegistryA
RegSaveKeyA
ReportEventW
DuplicateToken
StartServiceW
GetUserNameW
CryptReleaseContext
RegOpenKeyA
CryptSetProviderExW
CryptGetKeyParam
LookupPrivilegeDisplayNameA
RegCreateKeyW
wininet
InternetTimeFromSystemTimeA
HttpOpenRequestA
FindNextUrlCacheEntryExA
CreateUrlCacheContainerA
FtpGetFileW
GopherCreateLocatorA
UnlockUrlCacheEntryFileA
FindFirstUrlCacheEntryA
DeleteUrlCacheEntry
DeleteUrlCacheEntryW
Sections
.text Size: 118KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ