Static task
static1
Behavioral task
behavioral1
Sample
7d8b41cb6b56859de2617c2a3e4255c0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7d8b41cb6b56859de2617c2a3e4255c0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
7d8b41cb6b56859de2617c2a3e4255c0_NeikiAnalytics
-
Size
159KB
-
MD5
7d8b41cb6b56859de2617c2a3e4255c0
-
SHA1
d8fb68b1b6531ca937b64d9986b525292a136405
-
SHA256
7952f1f28959d6845a363d7805a2e19728783744316fb629fa713cc9a50c76b6
-
SHA512
f2536abdffc7d22c4d9d983c08f907ff16851734835179bcc703aaf05a588f970aeaca6a93d562061d8e9bf8427c0b41279bb60b425a614ea3346788dd058e2a
-
SSDEEP
3072:bNmlBOzPJ1hOTMKR9hyZc1PP4pv4tHQ/Ptc3DXbnyJs:bcYHI4ijZ9Ivz1YDXbS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7d8b41cb6b56859de2617c2a3e4255c0_NeikiAnalytics
Files
-
7d8b41cb6b56859de2617c2a3e4255c0_NeikiAnalytics.exe windows:5 windows x86 arch:x86
6080bfe3235cf25f8aae61b780e07a41
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
GetProcessHeap
HeapFree
GetProcAddress
GetModuleHandleW
GetTickCount
GetModuleFileNameW
SetEnvironmentVariableW
IsWow64Process
OpenProcess
GetLastError
DuplicateHandle
GetCommandLineW
OpenFileMappingW
MapViewOfFile
SetEvent
UnmapViewOfFile
CloseHandle
GetCommandLineA
CreateFileW
CreateFileMappingW
GetFileSizeEx
VirtualAlloc
VirtualFree
LoadLibraryW
ExitProcess
GetModuleHandleA
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xcpad Size: - Virtual size: 16.0MB
.idata Size: 1024B - Virtual size: 844B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 584B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 138KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ