Static task
static1
Behavioral task
behavioral1
Sample
dab6c104afc4129d88e44a939cf32760_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
dab6c104afc4129d88e44a939cf32760_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
dab6c104afc4129d88e44a939cf32760_NeikiAnalytics
-
Size
284KB
-
MD5
dab6c104afc4129d88e44a939cf32760
-
SHA1
22fdedb30aeac481e8185b615fdf186911d08092
-
SHA256
0916ae45d6a464fed0da57c84ec7c853778df214b7e0e110a377aa4ea165b22b
-
SHA512
f21d59e6518883600ca45e428cc6817d5f89a46ec74e7d212d18aed70103abe2849173a43651c4ffbed7cb5e0516cbaf3a785abea2b4d17fb99aa128cc0f397a
-
SSDEEP
6144:VI1UkyDg1g6gOav1jMpfoUWdkNqqKrbacSHtH5DeNuzrTz30FsHBdjVg1Y/yRrK5:KI6AvSkdSKrb9SHDhzrztu0yhK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dab6c104afc4129d88e44a939cf32760_NeikiAnalytics
Files
-
dab6c104afc4129d88e44a939cf32760_NeikiAnalytics.exe windows:4 windows x86 arch:x86
5938196ee9690b5587287406baf209a7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetMailslotInfo
EnumResourceLanguagesW
OpenSemaphoreA
GetPrivateProfileStructW
ReadConsoleOutputCharacterA
SetCommBreak
Heap32ListNext
CreateMailslotW
GetUserDefaultLCID
EnumSystemLocalesW
TerminateProcess
GetVersionExA
lstrcpynA
GetLastError
GetEnvironmentStrings
WriteConsoleW
VirtualFreeEx
LCMapStringW
lstrcatA
GetTimeFormatW
GetNumberOfConsoleMouseButtons
VirtualQuery
GetPrivateProfileStringA
Process32Next
GetEnvironmentVariableW
LocalSize
ReleaseMutex
GetStringTypeExW
GetCommModemStatus
WritePrivateProfileSectionW
SetSystemTimeAdjustment
GetCPInfoExA
GetThreadSelectorEntry
Beep
BackupSeek
CreateDirectoryExA
SetVolumeLabelW
lstrlenA
GlobalAlloc
IsDebuggerPresent
GlobalAddAtomW
GetNamedPipeHandleStateW
lstrcpyA
GetNumberFormatW
ReadConsoleA
GetProfileIntW
GetModuleHandleA
GetStartupInfoA
user32
CreateWindowExA
SetClipboardViewer
IsCharAlphaA
FillRect
GetDCEx
ScrollDC
PostMessageA
OemKeyScan
DrawMenuBar
DeferWindowPos
GetMenuDefaultItem
CreateCursor
DlgDirListW
CreateDesktopW
ExcludeUpdateRgn
EnumWindows
CharNextA
GetKeyboardType
OpenWindowStationW
SetClassWord
EnableMenuItem
EmptyClipboard
GetTabbedTextExtentA
OemToCharBuffW
GetWindowRgn
gdi32
EnumFontFamiliesW
GetNearestPaletteIndex
FillRgn
ExtTextOutA
FlattenPath
StartDocA
GetWinMetaFileBits
SetPaletteEntries
SetMetaRgn
CreateDIBSection
SetMiterLimit
CopyEnhMetaFileW
GetCharABCWidthsA
GetEnhMetaFileBits
EnumICMProfilesA
GetTextExtentPoint32W
GetLogColorSpaceW
PathToRegion
CreatePolyPolygonRgn
GetOutlineTextMetricsW
PolyBezierTo
ExtEscape
CreateFontA
PolyBezier
comdlg32
GetSaveFileNameW
advapi32
GetFileSecurityA
ReadEventLogA
RegEnumKeyExW
RegEnumKeyExA
QueryServiceLockStatusA
GetSecurityDescriptorLength
OpenEventLogW
CryptVerifySignatureW
AllocateAndInitializeSid
CryptSetProviderExA
RegOpenKeyW
GetSidLengthRequired
RegSetValueExW
ReportEventW
ObjectPrivilegeAuditAlarmW
AccessCheckAndAuditAlarmW
CryptGetDefaultProviderA
CryptGenKey
GetServiceKeyNameW
GetAuditedPermissionsFromAclW
GetTrusteeTypeA
GetKernelObjectSecurity
SetServiceStatus
shell32
SHGetDesktopFolder
SHLoadInProc
SHGetFileInfoW
ShellExecuteExW
SHGetSpecialFolderPathA
Shell_NotifyIconA
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
Sections
.text Size: 266KB - Virtual size: 266KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE