Static task
static1
Behavioral task
behavioral1
Sample
5b4a2b6f91ae3133d96b9106b3f356c0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5b4a2b6f91ae3133d96b9106b3f356c0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
5b4a2b6f91ae3133d96b9106b3f356c0_NeikiAnalytics.exe
-
Size
504KB
-
MD5
5b4a2b6f91ae3133d96b9106b3f356c0
-
SHA1
a06f6b3079c63afb38f29ca94d62f523dfc293c7
-
SHA256
4ca6ea0309c1d3e9cad4d119786c7237c43cf03498d8c3e5f508d3286dfe2d5f
-
SHA512
decffa6a65ada50b1c46286ba7d2efb2cc16d157b4e0ba03fb8c9cf70ea930280e3e60fcfd2102107344c7731c4b5d52835acad996f678a3668a3de0fd951930
-
SSDEEP
6144:upPNgUHhxT7/HSBAjNAXv/jEyeFEpbYzBfmKfoJNrbSjOlJ0pG:4PyUBNSBAjNIDmypbYzBeKfgr+jM0pG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5b4a2b6f91ae3133d96b9106b3f356c0_NeikiAnalytics.exe
Files
-
5b4a2b6f91ae3133d96b9106b3f356c0_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
90036bfa9cf9e6aca3698427e29f41c7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetTextJustification
GetDCBrushColor
SetTextAlign
SetSystemPaletteUse
GetTextCharsetInfo
UpdateColors
GetSystemPaletteUse
GetPolyFillMode
GetMetaRgn
SetTextColor
GetTextCharset
SetPixel
GetStretchBltMode
GetBkColor
user32
GetWindowLongA
BeginPaint
SendMessageA
GetInputState
GetDialogBaseUnits
GetPropA
IsWindowEnabled
WindowFromDC
CallWindowProcA
MoveWindow
EndPaint
GetMenuContextHelpId
GetMenuItemCount
RemovePropA
GetWindowContextHelpId
ShowWindow
GetWindowDC
GetScrollPos
GetMenu
IsWindowUnicode
CheckDlgButton
GetMenuState
GetQueueStatus
EnableWindow
kernel32
GetFullPathNameA
ReadConsoleW
ReadFile
SetEndOfFile
GetTimeZoneInformation
FlushFileBuffers
WriteConsoleW
SetStdHandle
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
SetFilePointerEx
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
GetProcAddress
GetModuleHandleA
GlobalHandle
IsProcessorFeaturePresent
GetFileTime
GetLastError
MoveFileA
QueryPerformanceCounter
GlobalFlags
GetCurrentThreadId
GetTickCount
GetFileType
LocalFlags
DeleteFileA
SetFilePointer
GetCurrentProcess
GetProcessHeap
CloseHandle
FindResourceA
LoadResource
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapReAlloc
GetCommandLineA
GetStdHandle
WriteFile
GetModuleFileNameW
SetLastError
GetCurrentThread
FindClose
FindFirstFileExW
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetConsoleCP
GetConsoleMode
GetModuleFileNameA
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
OutputDebugStringW
FileTimeToLocalFileTime
SetEnvironmentVariableA
Sections
.text Size: 438KB - Virtual size: 438KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE