Static task
static1
Behavioral task
behavioral1
Sample
4089861fadad9f3884fad19a89522a20_NeikiAnalytics.dll
Resource
win7-20240221-en
General
-
Target
4089861fadad9f3884fad19a89522a20_NeikiAnalytics.exe
-
Size
120KB
-
MD5
4089861fadad9f3884fad19a89522a20
-
SHA1
228ad52f5b9c9d0d24fd202abbcfad9fca37e1bc
-
SHA256
01b461364972d5d7016a6b5c956aa00469b3598f9dd0ef833e68901812eacbaf
-
SHA512
0bda4787f849a271f6e57fc453601d894f5bcb063b218b9f938a5182bb66e612383628899ed1c0643b295693c29fed95c9e841617ec97794839b07179021bfd8
-
SSDEEP
3072:8os8RtJwLJVMYRHxL0ve+zLC93gztoix9:k8RtmbMSxLme+zLC93gztoix
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4089861fadad9f3884fad19a89522a20_NeikiAnalytics.exe
Files
-
4089861fadad9f3884fad19a89522a20_NeikiAnalytics.exe.dll windows:4 windows x86 arch:x86
0f44bf2b3b0b8d5ecae5689ff1d0e90d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateProcessA
CloseHandle
WriteFile
CreateFileA
GetTickCount
lstrcpyA
lstrcatA
lstrlenA
GetTempPathA
SetErrorMode
user32
wsprintfA
Sections
.text Size: 119KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 376B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ