Static task
static1
Behavioral task
behavioral1
Sample
16e54a1f36a3f5b20b130a275a4bd760_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
16e54a1f36a3f5b20b130a275a4bd760_NeikiAnalytics.exe
-
Size
200KB
-
MD5
16e54a1f36a3f5b20b130a275a4bd760
-
SHA1
c09ae868ef842577400da756e7d5ef9a69059535
-
SHA256
58b1fd96bd360ac90303df8a7fda32f79a090ea793c4b293ab783daefa7ef01c
-
SHA512
2e6925370ce57059dc0054e9c33ff6f5d442517234b4b35c706725d6f9df70832f8b68639838b1d44ee386ef8a5eaa3eb431bd989104684b95cdc3f16761396d
-
SSDEEP
3072:a6p7yhovwPDrOJmco53xmIsXUN/a4Mp2Lg6PyjFOpRk:a6sPDKJTSNCULbPyIp2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 16e54a1f36a3f5b20b130a275a4bd760_NeikiAnalytics.exe
Files
-
16e54a1f36a3f5b20b130a275a4bd760_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
5dc9c4d3cdd2972e3db12ca4a57d1069
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersion
CloseHandle
WaitForSingleObject
CreateProcessA
lstrlenA
LocalFree
lstrcatA
FormatMessageA
GetPrivateProfileStringA
CreateThread
WriteFile
SizeofResource
CreateFileA
LockResource
LoadResource
FindResourceA
GetWindowsDirectoryA
Sleep
DeleteFileA
FindClose
FindNextFileA
FindFirstFileA
CreateDirectoryA
GetTempPathA
GetFileSize
CopyFileA
GetPrivateProfileIntA
FreeLibrary
GetDiskFreeSpaceA
GetProcAddress
LoadLibraryA
GetTempFileNameA
SetFileAttributesA
RemoveDirectoryA
GetLastError
lstrcpyA
GetCommandLineA
ExitProcess
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
GetUserDefaultLCID
RtlUnwind
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetSystemDirectoryA
lstrcpynA
OpenFile
GetModuleFileNameA
lstrcmpA
GetStartupInfoA
GetModuleHandleA
HeapFree
user32
PostMessageA
TranslateMessage
GetMessageA
UpdateWindow
ShowWindow
CreateWindowExA
RegisterClassA
LoadCursorA
LoadIconA
DefWindowProcA
PostQuitMessage
DialogBoxParamA
wsprintfA
LoadStringA
SetDlgItemTextA
SetWindowTextA
EnableWindow
GetDlgItem
SendMessageA
EndDialog
DispatchMessageA
SetWindowLongA
GetWindowLongA
InvalidateRect
ReleaseDC
GetDC
EndPaint
BeginPaint
DrawTextA
FillRect
GetSysColor
GetClientRect
MessageBoxA
GetWindowRect
GetSystemMetrics
SetWindowPos
FindWindowA
IsWindow
RegisterWindowMessageA
gdi32
RestoreDC
SetTextColor
SetBkMode
DeleteObject
CreateSolidBrush
SaveDC
Sections
.text Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 144KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE