Static task
static1
Behavioral task
behavioral1
Sample
35a7d45bc7ce740e846fb9b9a9dabf20_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
35a7d45bc7ce740e846fb9b9a9dabf20_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
35a7d45bc7ce740e846fb9b9a9dabf20_NeikiAnalytics.exe
-
Size
908KB
-
MD5
35a7d45bc7ce740e846fb9b9a9dabf20
-
SHA1
05fcfa9161fdd13cd3c9364153d28ab386b2f4c9
-
SHA256
1d3c32ba0ad27519808aec58bd12be80a873ef72a2adaa82af64c9d4c635c4cf
-
SHA512
09dbc1ebaf72ab41bdb8205121d23031d2655c7a3bfb90d4772ce84f8c3ef3480ea47bb5800723195203c2b651bbe4686e065fbe9a801f0c486be0db25064102
-
SSDEEP
12288:CTJlGguLrChmQuPtIQWPZWSPyvaimadxiM3xqYaDv86hjuZubki7qhY1mH8nEIV1:mJUdOgQGtIQWP6SiwM3xwjtuZubkPY0E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 35a7d45bc7ce740e846fb9b9a9dabf20_NeikiAnalytics.exe
Files
-
35a7d45bc7ce740e846fb9b9a9dabf20_NeikiAnalytics.exe.exe .vbs windows:4 windows x86 arch:x86 polyglot
d8dfb59c8a4c1366cd974a57dc5e09ea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comms
?Create@CComm@@SAPAV1@W4typserv@1@@Z
mfc80
ord2410
ord2390
ord934
ord930
ord932
ord928
ord923
ord5233
ord5235
ord5960
ord1600
ord4282
ord4722
ord3403
ord5203
ord4185
ord6275
ord5073
ord1908
ord5152
ord4244
ord1401
ord3946
ord1617
ord1620
ord5912
ord6724
ord1551
ord1670
ord1671
ord2020
ord4580
ord4890
ord4735
ord4212
ord5182
ord2164
ord2657
ord3609
ord3602
ord3428
ord590
ord1144
ord4261
ord4481
ord3635
ord762
ord1084
ord1128
ord2141
ord331
ord476
ord701
ord354
ord2372
ord1781
ord1880
ord1790
ord1793
ord6236
ord3641
ord1878
ord3683
ord4541
ord566
ord3333
ord2838
ord5566
ord5213
ord5230
ord4568
ord3948
ord2248
ord5226
ord5224
ord2931
ord1920
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2394
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord757
ord5383
ord6252
ord5568
ord5569
ord1054
ord1122
ord1126
ord3441
ord6090
ord2322
ord578
ord1489
ord876
ord2902
ord6118
ord299
ord6703
ord1482
ord2371
ord1903
ord572
ord3195
ord2991
ord5214
ord1402
ord5915
ord6725
ord620
ord1063
ord784
ord310
ord1892
ord1794
ord4749
ord709
ord501
ord3761
ord6067
ord781
ord304
ord297
ord1123
ord4109
ord2271
ord907
ord2131
ord2272
ord3934
ord4035
ord1024
ord1185
ord1187
ord4115
ord3397
ord6754
ord6752
ord3324
ord4243
ord1594
ord1650
ord748
ord2370
ord1425
ord3255
ord1181
ord5320
ord266
ord265
ord6286
ord2264
ord5731
ord2367
ord6065
ord5331
ord6297
ord3676
ord2400
ord2398
ord2396
ord2413
ord2408
ord2392
ord2415
ord2403
ord2385
ord2387
ord2405
ord2178
ord2172
ord1522
ord6279
ord3802
ord6277
ord3345
ord4967
ord1362
ord5175
ord1964
ord1656
ord1655
ord1599
ord5200
ord2537
ord2731
ord2835
ord4307
ord2714
ord2862
ord2540
ord2646
ord2533
ord3718
ord3719
ord3709
ord2644
ord3949
ord4486
ord4262
ord3182
ord605
ord764
ord2063
ord1207
msvcr80
_invoke_watson
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_except_handler4_common
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
memset
memmove_s
memcpy_s
__CxxFrameHandler3
sprintf
_setmbcp
_controlfp_s
kernel32
SetEvent
Beep
CloseHandle
Sleep
CreateEventA
InterlockedExchange
GetLastError
WaitForMultipleObjects
LoadLibraryA
GetModuleHandleA
GetProcAddress
SetLastError
InterlockedCompareExchange
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
ResetEvent
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
OutputDebugStringA
user32
GetSystemMetrics
CopyRect
PtInRect
LoadIconA
InvalidateRect
SetTimer
KillTimer
GetCursorPos
GetSysColor
GetSystemMenu
SendMessageA
GetClientRect
ScreenToClient
AppendMenuA
DrawIcon
GetParent
PostMessageA
EnableWindow
IsIconic
gdi32
GetTextExtentPoint32A
Sections
.text Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 860KB - Virtual size: 856KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ