Static task
static1
Behavioral task
behavioral1
Sample
32059bc86f68a9b6f401e6cc7682ffb0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
32059bc86f68a9b6f401e6cc7682ffb0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
32059bc86f68a9b6f401e6cc7682ffb0_NeikiAnalytics.exe
-
Size
1.7MB
-
MD5
32059bc86f68a9b6f401e6cc7682ffb0
-
SHA1
13a195e0e61dc5896a4a50ae441989ccda20e3d9
-
SHA256
77fdfd340109b47ed0f38f2f31c5f61c73d78d277abe40e9a4980453e0cba1f9
-
SHA512
5bc0e5b1b423a5d98eb01d805bcb44ea35300ae70828547151f04a22096f4d27213c80697dbd0b13225561847cf4009f8bda07530bad851c6840b44158302af8
-
SSDEEP
24576:8V/J21kdjsllR8KmTeYexu3d6s1g7zwBnf9RvU/r0iWegk7/i8Wm0xxXoKXSNgsG:CjsCeY5311gvCfyZCTLeW3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 32059bc86f68a9b6f401e6cc7682ffb0_NeikiAnalytics.exe
Files
-
32059bc86f68a9b6f401e6cc7682ffb0_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
7eb867012947687feefaf800a3d84515
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
PlaySoundA
imm32
ImmGetContext
ImmGetOpenStatus
ImmReleaseContext
comctl32
ImageList_BeginDrag
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragMove
ImageList_DragShowNolock
ImageList_Draw
ImageList_EndDrag
ImageList_GetIcon
ImageList_GetImageCount
ImageList_GetImageInfo
ImageList_Remove
ImageList_AddMasked
ImageList_ReplaceIcon
kernel32
SetErrorMode
SetEvent
SetFileAttributesA
SetFileTime
SetLastError
SetStdHandle
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
SuspendThread
SystemTimeToFileTime
SetConsoleCtrlHandler
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnlockFile
VirtualAlloc
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WinExec
WriteConsoleW
WriteFile
WritePrivateProfileStringA
SearchPathA
ResumeThread
ResetEvent
ReleaseMutex
ReadFile
ReadConsoleW
RtlUnwind
GetStartupInfoA
GetVersion
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
SetHandleCount
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
GetStringTypeA
LCMapStringA
RaiseException
QueryPerformanceCounter
OutputDebugStringW
OutputDebugStringA
OpenProcess
MultiByteToWideChar
MulDiv
MoveFileExW
MoveFileA
MapViewOfFile
lstrlenA
lstrcpynA
lstrcpyA
lstrcmpW
lstrcmpiA
lstrcmpA
LockResource
LockFile
LocalUnlock
LocalReAlloc
LocalLock
LocalFree
LocalFileTimeToFileTime
LocalAlloc
LoadResource
LoadLibraryW
LoadLibraryExW
LoadLibraryExA
LCMapStringW
IsValidLocale
IsValidCodePage
IsProcessorFeaturePresent
InterlockedIncrement
InterlockedExchange
InterlockedDecrement
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GlobalUnlock
GlobalSize
GlobalReAlloc
GlobalLock
GlobalHandle
GlobalGetAtomNameA
GlobalFree
GlobalFlags
GlobalFindAtomA
SetEnvironmentVariableA
GlobalAlloc
GlobalAddAtomA
GetWindowsDirectoryA
GetVolumeInformationA
GetVersionExA
GetUserDefaultLCID
GetTimeZoneInformation
GetTimeFormatW
GetThreadLocale
GetTempFileNameA
GetSystemInfo
GetSystemDirectoryW
GetStringTypeW
GetStringTypeExA
GetStdHandle
GetStartupInfoW
GetShortPathNameA
GetProfileIntA
GetProcessHeap
GetPrivateProfileStringA
GetPrivateProfileIntA
GetOEMCP
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetModuleFileNameA
GetLogicalDrives
GetLocaleInfoW
GetLastError
GetFullPathNameA
GetFileType
GetFileTime
GetFileSize
GetFileAttributesW
GetFileAttributesExA
GetFileAttributesA
GetEnvironmentStringsW
GetDriveTypeW
GetDriveTypeA
GetDiskFreeSpaceA
GetDateFormatW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentDirectoryW
GetCurrentDirectoryA
GetCPInfo
GetConsoleMode
GetConsoleCP
GetComputerNameA
GetAtomNameA
GetACP
FreeResource
FreeLibrary
FreeEnvironmentStringsW
FormatMessageA
FlushFileBuffers
FindResourceW
FindResourceExW
FindResourceA
FindNextFileA
FindFirstFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FatalAppExitA
ExpandEnvironmentStringsA
ExitThread
ExitProcess
EnumSystemLocalesW
DuplicateHandle
DeleteFileW
DeleteFileA
DeleteCriticalSection
CreateThread
CreateSemaphoreW
CreateMutexA
CreateFileW
CreateFileMappingA
CreateFileA
CreateEventA
CreateDirectoryW
CopyFileA
CompareStringW
CompareStringA
CompareFileTime
CloseHandle
Beep
GetSystemTimeAsFileTime
GetCommandLineA
InitializeCriticalSection
EnterCriticalSection
GetTickCount
LeaveCriticalSection
LoadLibraryA
GetProcAddress
GetTempPathA
SetEndOfFile
SetCurrentDirectoryW
GlobalDeleteAtom
SetCurrentDirectoryA
TerminateProcess
user32
SetDlgItemInt
SetDlgItemTextA
SetFocus
SetForegroundWindow
SetMenuDefaultItem
SetMenuItemBitmaps
SetMenuItemInfoA
SetMenuItemInfoW
SetParent
SetPropA
SetRect
SetRectEmpty
SetScrollInfo
SetScrollPos
SetScrollRange
SetTimer
SetWindowLongA
SetWindowPlacement
SetWindowPos
SetWindowRgn
SetWindowsHookExA
SetWindowTextA
ShowCursor
ShowOwnedPopups
ShowScrollBar
ShowWindow
SubtractRect
SystemParametersInfoA
TabbedTextOutA
ToAsciiEx
TrackPopupMenuEx
TranslateAcceleratorA
TranslateMDISysAccel
TranslateMessage
UnhookWindowsHookEx
UnionRect
UnregisterClassA
UpdateWindow
ValidateRect
WaitMessage
WindowFromDC
WindowFromPoint
WinHelpA
wsprintfA
SetCursorPos
SetClipboardData
SetClassLongA
SetCapture
SetActiveWindow
SendNotifyMessageA
SendMessageA
SendDlgItemMessageA
ScrollWindowEx
ScreenToClient
RemovePropA
RemoveMenu
ReleaseDC
ReleaseCapture
RegisterWindowMessageA
RegisterClipboardFormatA
RegisterClassA
RedrawWindow
PtInRect
PostThreadMessageA
PostQuitMessage
PostMessageA
PeekMessageA
OpenClipboard
OffsetRect
MoveWindow
ModifyMenuA
MessageBoxA
MessageBeep
MapWindowPoints
MapVirtualKeyExA
MapVirtualKeyA
MapDialogRect
LockWindowUpdate
LoadStringA
LoadMenuW
LoadMenuA
LoadImageW
LoadImageA
LoadIconW
LoadIconA
LoadCursorW
LoadCursorA
LoadBitmapW
LoadBitmapA
LoadAcceleratorsW
LoadAcceleratorsA
KillTimer
keybd_event
IsZoomed
IsWindowVisible
IsWindowEnabled
IsRectEmpty
IsMenu
IsIconic
IsDlgButtonChecked
IsDialogMessageA
IsClipboardFormatAvailable
IsChild
IsCharLowerA
InvertRect
InvalidateRect
IntersectRect
InsertMenuItemA
InsertMenuA
InSendMessage
InflateRect
HideCaret
GrayStringA
GetWindowThreadProcessId
GetWindowTextLengthA
GetWindowTextA
GetWindowRgn
GetWindowRect
GetWindowPlacement
GetWindowLongA
GetWindowDC
GetUpdateRect
GetTopWindow
GetTabbedTextExtentA
GetSystemMetrics
GetSystemMenu
GetSysColorBrush
GetSubMenu
GetScrollRange
GetScrollPos
GetScrollInfo
GetPropA
GetParent
GetNextDlgTabItem
GetNextDlgGroupItem
GetMessageTime
GetMessagePos
GetMessageA
GetMenuStringA
GetMenuState
GetMenuItemInfoW
GetMenuItemInfoA
GetMenuItemID
GetMenuItemCount
GetMenuDefaultItem
GetMenuCheckMarkDimensions
GetLastActivePopup
GetKeyState
GetKeyNameTextA
GetKeyboardState
GetKeyboardLayout
GetIconInfo
GetForegroundWindow
GetFocus
GetDoubleClickTime
GetDlgItemTextA
GetDlgItemInt
GetDlgCtrlID
GetDialogBaseUnits
GetDesktopWindow
GetDCEx
GetCursorPos
GetCursor
GetClientRect
GetClassNameA
GetClassLongA
GetClassInfoExA
GetClassInfoA
GetCapture
GetAsyncKeyState
GetActiveWindow
FrameRect
FindWindowExA
FindWindowA
FillRect
EqualRect
EnumWindows
EnumDisplaySettingsA
EnumChildWindows
EndPaint
EndDialog
EndDeferWindowPos
EnableWindow
EnableScrollBar
EnableMenuItem
DrawTextW
DrawTextExA
DrawTextA
DrawStateA
DrawMenuBar
DrawIconEx
DrawFrameControl
DrawFocusRect
DrawEdge
DispatchMessageA
DestroyWindow
DestroyMenu
DestroyIcon
DestroyCursor
DestroyAcceleratorTable
DeleteMenu
DefWindowProcA
DefMDIChildProcA
DefFrameProcA
CreateWindowExA
CreatePopupMenu
CreateMenu
CreateDialogIndirectParamA
ReuseDDElParam
UnpackDDElParam
CreateAcceleratorTableA
CopyRect
CopyImage
CopyIcon
CopyAcceleratorTableA
CloseClipboard
ClipCursor
ClientToScreen
ChildWindowFromPointEx
CheckRadioButton
CheckMenuItem
CheckDlgButton
CharUpperBuffA
CharUpperA
CallWindowProcA
CallNextHookEx
BringWindowToTop
BeginPaint
BeginDeferWindowPos
AttachThreadInput
AppendMenuA
EmptyClipboard
GetTabbedTextExtentW
gdi32
Escape
ExcludeClipRect
ExtCreatePen
ExtFloodFill
ExtSelectClipRgn
ExtTextOutA
FillRgn
FrameRgn
GetBkColor
GetBkMode
GetBoundsRect
GetCharWidthA
GetClipBox
GetClipRgn
GetCurrentObject
GetCurrentPositionEx
GetDeviceCaps
GetDIBits
GetMapMode
GetNearestColor
GetNearestPaletteIndex
GetObjectA
GetObjectType
GetPaletteEntries
GetPixel
GetPolyFillMode
GetRgnBox
GetROP2
GetStockObject
GetStretchBltMode
GetSystemPaletteEntries
GetTextAlign
GetTextCharsetInfo
GetTextColor
GetTextExtentPoint32A
GetTextExtentPoint32W
GetTextExtentPointA
GetTextFaceA
GetTextMetricsA
GetViewportExtEx
GetViewportOrgEx
GetWindowExtEx
GetWindowOrgEx
IntersectClipRect
CreateFontIndirectA
EnumMetaFile
LPtoDP
ModifyWorldTransform
MoveToEx
OffsetClipRgn
OffsetRgn
OffsetViewportOrgEx
EnumFontFamiliesExA
PatBlt
PlayMetaFile
PlayMetaFileRecord
PolyBezierTo
PolyDraw
Polygon
Polyline
PolylineTo
PtInRegion
PtVisible
RealizePalette
Rectangle
RectInRegion
RectVisible
RestoreDC
RoundRect
SaveDC
ScaleViewportExtEx
ScaleWindowExtEx
SelectClipPath
SelectClipRgn
SelectObject
SelectPalette
SetAbortProc
SetArcDirection
SetBkColor
SetBkMode
SetColorAdjustment
SetDIBColorTable
SetGraphicsMode
SetMapMode
SetMapperFlags
SetPaletteEntries
SetPixelV
SetPolyFillMode
SetRectRgn
SetROP2
SetStretchBltMode
SetTextAlign
SetTextCharacterExtra
SetTextColor
SetTextJustification
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
SetWindowOrgEx
SetWorldTransform
StartDocA
StartPage
StretchBlt
StretchDIBits
UnrealizeObject
EnumFontFamiliesA
EndPage
EndDoc
Ellipse
DPtoLP
DeleteObject
DeleteMetaFile
DeleteDC
CreateSolidBrush
CreateRoundRectRgn
CreateRectRgnIndirect
OffsetWindowOrgEx
CreateRectRgn
CreatePolygonRgn
CreatePatternBrush
CreatePalette
CreateMetaFileA
LineTo
AbortDoc
CreateFontA
CreateEllipticRgn
CreateDIBSection
CreateDIBPatternBrushPt
CreateDIBitmap
CreateDCA
CreateCompatibleDC
CreateCompatibleBitmap
CreateBitmap
CopyMetaFileA
CombineRgn
CloseMetaFile
BitBlt
ArcTo
CreateHatchBrush
advapi32
RegSetValueExA
RegSetValueA
RegQueryValueExA
RegQueryValueA
RegOpenKeyExW
RegOpenKeyExA
RegFlushKey
RegEnumValueA
RegEnumKeyExA
RegEnumKeyA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
GetFileSecurityA
FreeSid
AllocateAndInitializeSid
SetFileSecurityA
shell32
DragAcceptFiles
DragFinish
DragQueryFileA
ExtractIconA
Shell_NotifyIconA
ShellExecuteA
ShellExecuteExA
ole32
CreateStreamOnHGlobal
DoDragDrop
GetHGlobalFromILockBytes
GetRunningObjectTable
IsAccelerator
OleCreateFromData
OleCreateFromFile
OleCreateLinkFromData
OleCreateLinkToFile
OleCreateMenuDescriptor
OleCreateStaticFromData
OleDestroyMenuDescriptor
OleDuplicateData
OleFlushClipboard
OleGetClipboard
OleGetIconOfClass
OleInitialize
OleIsCurrentClipboard
OleIsRunning
OleLoad
OleLockRunning
OleQueryCreateFromData
OleQueryLinkFromData
OleRegEnumVerbs
OleRegGetMiscStatus
OleRegGetUserType
OleRun
OleSaveToStream
OleSetClipboard
OleSetContainedObject
OleSetMenuDescriptor
OleTranslateAccelerator
OleUninitialize
PropVariantCopy
ReadClassStg
ReadFmtUserTypeStg
CreateOleAdviseHolder
ReleaseStgMedium
RevokeDragDrop
SetConvertStg
StgCreateDocfile
StgCreateDocfileOnILockBytes
StgIsStorageFile
StgOpenStorage
StgOpenStorageOnILockBytes
StringFromCLSID
StringFromGUID2
WriteClassStg
WriteClassStm
WriteFmtUserTypeStg
CreateILockBytesOnHGlobal
CreateGenericComposite
CreateFileMoniker
CreateDataAdviseHolder
CreateBindCtx
CoUninitialize
CoTreatAsClass
CoTaskMemFree
CoTaskMemAlloc
CoRevokeClassObject
CoRegisterMessageFilter
CoRegisterClassObject
CoLockObjectExternal
CoInitialize
CoGetMalloc
CoGetClassObject
CoFreeUnusedLibraries
CoDisconnectObject
CoCreateInstance
CoCreateGuid
CLSIDFromString
CLSIDFromProgID
RegisterDragDrop
CreateItemMoniker
shlwapi
PathStripToRootA
PathRemoveFileSpecW
PathRemoveExtensionA
PathIsUNCA
PathFindFileNameA
PathFindExtensionA
Sections
.text Size: 756KB - Virtual size: 752KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.last5 Size: 860KB - Virtual size: 864KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE