Static task
static1
Behavioral task
behavioral1
Sample
b894569c61e5c110ec2c018802780e20_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b894569c61e5c110ec2c018802780e20_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
General
-
Target
b894569c61e5c110ec2c018802780e20_NeikiAnalytics
-
Size
38KB
-
MD5
b894569c61e5c110ec2c018802780e20
-
SHA1
9abc007d6a6120264a83687247997256ce932c81
-
SHA256
2f043486638377dae8b005fa5d258c6aa437e689af54f5ec5d00ce23fd50d270
-
SHA512
a68dfc4db8b77c680db2497d83ba09d8fc36af71bbac0b1494f00ed40d046d7a9c57d84349e0303258637bd579e6eea6341d4c634d754d80b5bc85dd26d219eb
-
SSDEEP
768:gR2Nr23COLK8wla/T4Jfl52HT6tHf+2PlvD0qX9eipPzbXttcYqvq:SYq3HLK8w24tfXx0qX9eitbXLqvq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b894569c61e5c110ec2c018802780e20_NeikiAnalytics
Files
-
b894569c61e5c110ec2c018802780e20_NeikiAnalytics.dll windows:4 windows x86 arch:x86
be4a8f324f92dc07eee423c9e8842398
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
SetMenuInfo
OemToCharW
DrawStateA
CreateMenu
CreateMDIWindowA
kernel32
SetEndOfFile
lstrlenA
lstrcpynA
lstrcpyA
WriteFile
VirtualFree
CompareStringA
EnterCriticalSection
ExitProcess
ExitThread
GetCommandLineA
GetDateFormatA
GetLocalTime
GetSystemTimeAsFileTime
InitializeCriticalSection
LoadResource
MapViewOfFile
SetCurrentDirectoryA
VirtualAlloc
Sleep
TlsAlloc
TlsFree
TlsGetValue
oleaut32
SafeArrayAccessData
SafeArrayCreate
SysStringLen
VarBstrCat
OleLoadPicturePath
ClearCustData
Sections
.text Size: 20KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ