Static task
static1
Behavioral task
behavioral1
Sample
1c89de91c40226811ccf835fae6a94b0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1c89de91c40226811ccf835fae6a94b0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1c89de91c40226811ccf835fae6a94b0_NeikiAnalytics.exe
-
Size
205KB
-
MD5
1c89de91c40226811ccf835fae6a94b0
-
SHA1
eb53372dd544288de52873bcb2e885cb97727021
-
SHA256
7ed8da58f9a0806200868eaa9576c3647a4b63898e1853304816369bdcae5657
-
SHA512
fd01014d875d170f14dd66e09625df90d52ac914fb8fd8e9339b808f64af0eded02b4e502fd975be0814ee6a9e78bbfe85208618db45ff8a705ea3db642026cd
-
SSDEEP
3072:e7VD4DUHnNZkfOP6sfIOpJ9C3hPlGxt1UhRkgyankTIzfwAYzWcXCyqT36zhRRKy:0zHnMLm5GNGxHUhtnkdpHqTKzhh8i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1c89de91c40226811ccf835fae6a94b0_NeikiAnalytics.exe
Files
-
1c89de91c40226811ccf835fae6a94b0_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
616d060f84174fbe550615d295f4ce51
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLocaleInfoA
lstrcpyn
CreateNamedPipeA
GetEnvironmentVariableA
GetExitCodeThread
OpenEventW
GetLogicalDriveStringsA
CopyFileExW
SetPriorityClass
GetProcAddress
CreateMutexA
CreateMutexW
QueryPerformanceCounter
CreateThread
SetUnhandledExceptionFilter
OpenMutexW
GetExitCodeProcess
GlobalGetAtomNameA
GetFileTime
GetCalendarInfoA
MulDiv
CreateFileMappingW
CreateMailslotA
FreeResource
LocalFree
DeleteAtom
GetVolumeInformationA
RaiseException
AddAtomA
GlobalFindAtomW
RemoveDirectoryW
GlobalFindAtomA
CreateMailslotW
GetProcessHeaps
EndUpdateResourceA
CopyFileExA
CreateNamedPipeW
SleepEx
GetModuleHandleA
WaitForSingleObject
GetSystemDefaultLangID
SetEvent
TlsAlloc
SetCalendarInfoW
GetLastError
GetFileSize
lstrlen
DuplicateHandle
GetAtomNameW
GetStringTypeW
CreateFileA
user32
CheckMenuItem
GetDC
DefDlgProcW
BringWindowToTop
GetDlgItem
EnumWindows
PeekMessageW
SetCursor
GetWindowLongA
MessageBoxIndirectW
CreatePopupMenu
keybd_event
GetWindowTextLengthA
gdi32
CreateFontIndirectExA
CreatePolygonRgn
CreateDIBitmap
GetLogColorSpaceW
SetGraphicsMode
GdiGetBatchLimit
ScaleWindowExtEx
SelectObject
GetEnhMetaFileHeader
GetFontData
SetLayout
SetRectRgn
ExtSelectClipRgn
EnumFontFamiliesA
GetAspectRatioFilterEx
GetNearestPaletteIndex
PolylineTo
PatBlt
SelectClipRgn
advapi32
RegEnumValueW
RegReplaceKeyA
RegCreateKeyW
RegQueryValueA
RegCreateKeyExA
RegReplaceKeyW
RegCloseKey
shlwapi
PathGetArgsW
ChrCmpIA
StrSpnW
PathAddBackslashW
PathIsUNCA
SHRegOpenUSKeyW
PathIsPrefixA
PathCompactPathExA
comctl32
FlatSB_SetScrollRange
InitCommonControls
winspool.drv
AddFormW
EnumMonitorsW
OpenPrinterW
GetJobW
DeleteMonitorA
EndDocPrinter
AddPrinterConnectionW
SetPrinterDataExW
inetcomm
MimeOleParseRfc822Address
MimeOleParseRfc822AddressW
HrGetAttachIcon
EssSecurityLabelEncodeEx
MimeOleGetDefaultCharset
MimeOleGetFileExtension
HrAttachDataFromFile
EssKeyExchPreferenceEncodeEx
EssSignCertificateDecodeEx
MimeOleSMimeCapGetHashAlg
EssKeyExchPreferenceDecodeEx
MimeOleGetCharsetInfo
MimeOleGetCertsFromThumbprints
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.j Size: 1KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nkytZ Size: 1024B - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.N Size: 3KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fc Size: 1KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.s Size: 2KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.w Size: 2KB - Virtual size: 191KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1022B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ