Behavioral task
behavioral1
Sample
4f7cd0e86168bc0a31d6869c1555ef80_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4f7cd0e86168bc0a31d6869c1555ef80_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
4f7cd0e86168bc0a31d6869c1555ef80_NeikiAnalytics.exe
-
Size
168KB
-
MD5
4f7cd0e86168bc0a31d6869c1555ef80
-
SHA1
fefe2184a84a6a0ce305af9866aba2a934e2c9c0
-
SHA256
3d9a4e8993aa61c04160c270047d70dd613381988eab32127e254b7e60b30e0d
-
SHA512
7424b3a8cce8074437781706658319c742886854f9ce6f6b187f3599de5ffbfa18bc1a0211865629d858d5c0ae9efc2ba75a68f6531b99c6f068441965f12d47
-
SSDEEP
384:6vq7SSSSSsPxC8eOuq9oG/gusYbtFmX7gQ4P4wp+DVIV:6SvJC8eeyYpFmrgQpbDV
Malware Config
Signatures
-
Patched UPX-packed file 1 IoCs
Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.
resource yara_rule sample patched_upx -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4f7cd0e86168bc0a31d6869c1555ef80_NeikiAnalytics.exe
Files
-
4f7cd0e86168bc0a31d6869c1555ef80_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 1.1MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 161KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE