Static task
static1
Behavioral task
behavioral1
Sample
a8e123c8738017f78ea9691c831aeaa0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a8e123c8738017f78ea9691c831aeaa0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
a8e123c8738017f78ea9691c831aeaa0_NeikiAnalytics.exe
-
Size
205KB
-
MD5
a8e123c8738017f78ea9691c831aeaa0
-
SHA1
a4aea1e5c9486c851caefc4fd582c73107e2d1ce
-
SHA256
57ed6f6ca1119a26492627906ab0d69d7dee421f033ebd853e8cf784e2c7873e
-
SHA512
e8291e8605a2c37282bff779d500af1ad412bd9c3f0d7f6ee3021fa263afbee2920fd2b2a7aa0b90f2314b223900a416375fdbe251f937c5da728a7a83597bb1
-
SSDEEP
3072:z7VD4DUHnNZkfOP6sfIOpJ9C3hPlGxt1UhRkgyankTIzfwAYzWcXCyqT36zhRRKy:dzHnMLm5GNGxHUhtnkdpHqTKzhh8i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a8e123c8738017f78ea9691c831aeaa0_NeikiAnalytics.exe
Files
-
a8e123c8738017f78ea9691c831aeaa0_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
616d060f84174fbe550615d295f4ce51
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLocaleInfoA
lstrcpyn
CreateNamedPipeA
GetEnvironmentVariableA
GetExitCodeThread
OpenEventW
GetLogicalDriveStringsA
CopyFileExW
SetPriorityClass
GetProcAddress
CreateMutexA
CreateMutexW
QueryPerformanceCounter
CreateThread
SetUnhandledExceptionFilter
OpenMutexW
GetExitCodeProcess
GlobalGetAtomNameA
GetFileTime
GetCalendarInfoA
MulDiv
CreateFileMappingW
CreateMailslotA
FreeResource
LocalFree
DeleteAtom
GetVolumeInformationA
RaiseException
AddAtomA
GlobalFindAtomW
RemoveDirectoryW
GlobalFindAtomA
CreateMailslotW
GetProcessHeaps
EndUpdateResourceA
CopyFileExA
CreateNamedPipeW
SleepEx
GetModuleHandleA
WaitForSingleObject
GetSystemDefaultLangID
SetEvent
TlsAlloc
SetCalendarInfoW
GetLastError
GetFileSize
lstrlen
DuplicateHandle
GetAtomNameW
GetStringTypeW
CreateFileA
user32
CheckMenuItem
GetDC
DefDlgProcW
BringWindowToTop
GetDlgItem
EnumWindows
PeekMessageW
SetCursor
GetWindowLongA
MessageBoxIndirectW
CreatePopupMenu
keybd_event
GetWindowTextLengthA
gdi32
CreateFontIndirectExA
CreatePolygonRgn
CreateDIBitmap
GetLogColorSpaceW
SetGraphicsMode
GdiGetBatchLimit
ScaleWindowExtEx
SelectObject
GetEnhMetaFileHeader
GetFontData
SetLayout
SetRectRgn
ExtSelectClipRgn
EnumFontFamiliesA
GetAspectRatioFilterEx
GetNearestPaletteIndex
PolylineTo
PatBlt
SelectClipRgn
advapi32
RegEnumValueW
RegReplaceKeyA
RegCreateKeyW
RegQueryValueA
RegCreateKeyExA
RegReplaceKeyW
RegCloseKey
shlwapi
PathGetArgsW
ChrCmpIA
StrSpnW
PathAddBackslashW
PathIsUNCA
SHRegOpenUSKeyW
PathIsPrefixA
PathCompactPathExA
comctl32
FlatSB_SetScrollRange
InitCommonControls
winspool.drv
AddFormW
EnumMonitorsW
OpenPrinterW
GetJobW
DeleteMonitorA
EndDocPrinter
AddPrinterConnectionW
SetPrinterDataExW
inetcomm
MimeOleParseRfc822Address
MimeOleParseRfc822AddressW
HrGetAttachIcon
EssSecurityLabelEncodeEx
MimeOleGetDefaultCharset
MimeOleGetFileExtension
HrAttachDataFromFile
EssKeyExchPreferenceEncodeEx
EssSignCertificateDecodeEx
MimeOleSMimeCapGetHashAlg
EssKeyExchPreferenceDecodeEx
MimeOleGetCharsetInfo
MimeOleGetCertsFromThumbprints
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.j Size: 1KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nkytZ Size: 1024B - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.N Size: 3KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fc Size: 1KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.s Size: 2KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.w Size: 2KB - Virtual size: 191KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1022B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ