Static task
static1
Behavioral task
behavioral1
Sample
3353dec4b349bdc3e3a67800d67e8c40_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3353dec4b349bdc3e3a67800d67e8c40_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3353dec4b349bdc3e3a67800d67e8c40_NeikiAnalytics
-
Size
130KB
-
MD5
3353dec4b349bdc3e3a67800d67e8c40
-
SHA1
f02190ebae6e871cde8b1901200105171d1574e7
-
SHA256
02e4b8acb9523084d3333f7ce062bde4e627d21132c073a9e47a0b19ebfe8260
-
SHA512
274f7eb6968df0f31a1e73a61cdc7af8639fd4036df413fc8d463c412c52e02ac020692c4fd6256b678a2d573f9d3f7a70f5c194133975d54671626427cd12df
-
SSDEEP
3072:GidD4f5MIVYKq8xJPocX+flykOOa2L02PD:LD+LVYIJX+fZc2PD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3353dec4b349bdc3e3a67800d67e8c40_NeikiAnalytics
Files
-
3353dec4b349bdc3e3a67800d67e8c40_NeikiAnalytics.exe windows:4 windows x86 arch:x86
c1e7cc004ffcb00fef181f2a07f3866e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetShortPathNameA
GetWindowsDirectoryA
MoveFileExA
RemoveDirectoryA
CopyFileA
CompareFileTime
GetFileTime
SetFileAttributesA
GetVersionExA
GetLastError
CreateMutexA
GetFileSize
GetModuleFileNameA
GetCommandLineA
GetCurrentProcess
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
GetCurrentDirectoryA
VirtualAlloc
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapFree
HeapSize
TerminateProcess
HeapAlloc
HeapReAlloc
ExitProcess
GetVersion
GetStartupInfoA
SetCurrentDirectoryA
MultiByteToWideChar
SetErrorMode
GetProcAddress
FreeLibrary
CreateProcessA
LCMapStringW
Sleep
GetExitCodeProcess
GetTempPathA
GetTickCount
GetFileAttributesA
WriteFile
CreateFileA
SetFilePointer
CloseHandle
ReadFile
GlobalReAlloc
GlobalUnlock
GlobalFree
GlobalAlloc
GlobalLock
DeleteFileA
lstrcpyA
lstrlenA
lstrcatA
GetModuleHandleA
LoadLibraryA
MulDiv
user32
SetDlgItemTextA
MessageBoxA
GetParent
DialogBoxParamA
GetWindowTextA
PostQuitMessage
GetDlgItem
GetDlgItemTextA
ReleaseDC
GetDC
GetDesktopWindow
LoadCursorA
ExitWindowsEx
EnableWindow
GetWindowRect
SystemParametersInfoA
ShowWindow
SetFocus
SendDlgItemMessageA
IsDialogMessageA
WaitMessage
MsgWaitForMultipleObjects
TranslateMessage
DispatchMessageA
PeekMessageA
GetMessageA
GetSystemMetrics
RegisterClassExA
SetWindowTextA
DefWindowProcA
ChildWindowFromPoint
GetWindowLongA
SetCursor
InvalidateRect
LoadIconA
LoadImageA
GetSysColor
CreateWindowExA
SetWindowLongA
SendMessageA
EndDialog
gdi32
CreateSolidBrush
GetDeviceCaps
GetStockObject
DeleteDC
StretchDIBits
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBitmap
CreateFontA
SetBkMode
SetBkColor
SetTextColor
DeleteObject
CreatePalette
advapi32
RegQueryValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
RegCloseKey
RegEnumKeyExA
shell32
ShellExecuteA
ole32
CoUninitialize
OleInitialize
OleUninitialize
CoInitialize
oleaut32
UnRegisterTypeLi
LoadTypeLi
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
comctl32
ord17
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ