Static task
static1
Behavioral task
behavioral1
Sample
d6fe1beb4112f66952909bdf42657a50_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
d6fe1beb4112f66952909bdf42657a50_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
d6fe1beb4112f66952909bdf42657a50_NeikiAnalytics.exe
-
Size
179KB
-
MD5
d6fe1beb4112f66952909bdf42657a50
-
SHA1
0ca0e8e30e0f421aad0bb8c3aeb993af0dd4fbc0
-
SHA256
21ff32bd42baf219a756ecbeb2a7250591946e48d513d24225fd0773c0d13efa
-
SHA512
ef778a1e6d80380c5ee174203b60dfb314ea114eead5ca4f68c762b9f6ea3ad9bc2f7382fb1db9eb059586e8587ed39370deff656e36bd72a9cb8e2276f2b842
-
SSDEEP
1536:daN4rYd0zoo8TDl6JH48wIDQo8m9nBOR9eGRiFvXmBtblZzRgp5Q3f0vsWB/HmoM:dTUyMk+qVARymoMtw0NOdiW2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d6fe1beb4112f66952909bdf42657a50_NeikiAnalytics.exe
Files
-
d6fe1beb4112f66952909bdf42657a50_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
c98815ecd02f1a6b659ee59f361c75ed
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
comctl32
InitCommonControlsEx
gdi32
CreateFontIndirectW
GetTextMetricsW
kernel32
CopyFileA
CreateDirectoryA
CreateThread
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FormatMessageA
GetCommandLineA
GetCurrentDirectoryW
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetStartupInfoA
InitializeCriticalSection
LeaveCriticalSection
LocalFree
MoveFileExA
MultiByteToWideChar
SetCurrentDirectoryW
SetUnhandledExceptionFilter
TlsGetValue
VirtualProtect
VirtualQuery
msvcrt
_stat
_strdup
_stricmp
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_makepath
_onexit
_setmode
_snwprintf
_splitpath
_wfopen
_wputenv
_wsplitpath
abort
atexit
calloc
exit
fclose
fopen
fputs
fread
free
fseek
ftell
fwrite
malloc
memchr
memcpy
memset
perror
realloc
rewind
signal
sprintf
strcat
strchr
strcmp
strlen
strncpy
strstr
strtok
vfprintf
vsprintf
wcscat
wcscpy
wcslen
wcsrchr
user32
CopyRect
CreateWindowExW
DefWindowProcW
DestroyWindow
DialogBoxParamW
DispatchMessageW
EnableWindow
EndDialog
GetClientRect
GetDC
GetDesktopWindow
GetMessagePos
GetMessageW
GetParent
GetSystemMenu
GetSystemMetrics
GetWindowLongW
GetWindowRect
LoadAcceleratorsW
LoadImageW
MapWindowPoints
MessageBoxA
MessageBoxW
MoveWindow
OffsetRect
PostQuitMessage
RedrawWindow
RegisterClassExW
ScreenToClient
SendMessageW
SetActiveWindow
SetWindowLongW
SetWindowPos
SetWindowTextW
ShowWindow
SystemParametersInfoW
TranslateAcceleratorW
TranslateMessage
UpdateWindow
wsprintfW
lua51
luaL_loadfile
luaL_newstate
luaL_openlibs
lua_atpanic
lua_call
lua_close
lua_getfield
lua_gettable
lua_isstring
lua_next
lua_objlen
lua_pcall
lua_pushinteger
lua_pushnil
lua_pushstring
lua_setfield
lua_settop
lua_toboolean
lua_tolstring
lua_type
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 420B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 145KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE