Static task
static1
Behavioral task
behavioral1
Sample
df659f33e8b5145be4aa9411df806cb0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
df659f33e8b5145be4aa9411df806cb0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
df659f33e8b5145be4aa9411df806cb0_NeikiAnalytics.exe
-
Size
424KB
-
MD5
df659f33e8b5145be4aa9411df806cb0
-
SHA1
b5d4fcb8b8004198542c75609cec83cd66fa1a39
-
SHA256
187a21f1513db93bcb7413dda0f63d94f4fb5ea328d044b121fe30fedb14066f
-
SHA512
4af53c97688a24a9dda539ebbf4f2539697934d1fc50502fd5a9496c24d4cab8095809a1fe9a54d76e587505238cbc5e3d12d689cbfb4e28a7212257a8128cfd
-
SSDEEP
12288:Q3QPlEPJBq3ASbYezAjkFyHCkjU8gFheSk59yZ1:APYASBAzHFjWGSk3yZ1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource df659f33e8b5145be4aa9411df806cb0_NeikiAnalytics.exe
Files
-
df659f33e8b5145be4aa9411df806cb0_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
8c1ba40afc0b505189dcd3cdaf811bd2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
CopySid
DeregisterEventSource
GetLengthSid
GetUserNameA
RegCloseKey
RegCreateKeyA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegSetValueExA
RegisterEventSourceA
ReportEventA
kernel32
CloseHandle
CreateDirectoryA
CreateEventA
CreateFileA
CreateFileMappingA
CreatePipe
CreateProcessA
CreateThread
DeleteFileA
ExitProcess
ExpandEnvironmentStringsA
FindClose
FindFirstFileA
FindNextFileA
FormatMessageA
FreeLibrary
GetConsoleMode
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetFileAttributesA
GetFileSize
GetFileTime
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOverlappedResult
GetProcAddress
GetProcessTimes
GetStdHandle
GetSystemDirectoryA
GetSystemTime
GetSystemTimeAdjustment
GetThreadTimes
GetTickCount
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalLock
GlobalMemoryStatus
GlobalUnlock
LoadLibraryA
LocalAlloc
LocalFree
MapViewOfFile
OpenProcess
QueryPerformanceCounter
ReadFile
SetConsoleMode
SetCurrentDirectoryA
SetEvent
SetFilePointer
SetFileTime
SetHandleInformation
SetUnhandledExceptionFilter
UnmapViewOfFile
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WriteFile
msvcrt
_itoa
_ltoa
_mkdir
_putenv
_stricmp
_strnicmp
_unlink
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_errno
_findclose
_findfirst
_findnext
_fullpath
_iob
_isctype
_locking
_mkdir
_onexit
_pctype
_rmdir
_setmode
_stat
_vsnprintf
abort
atexit
atoi
calloc
difftime
exit
fclose
fflush
fgetc
fgets
fopen
fprintf
fputc
fputs
fread
free
fseek
ftell
fwrite
getenv
localtime
malloc
memchr
memcmp
memcpy
memmove
mktime
printf
putchar
puts
qsort
rand
realloc
signal
sprintf
srand
sscanf
strcat
strchr
strcmp
strcpy
strcspn
strftime
strlen
strncmp
strncpy
strrchr
strspn
strstr
strtol
strtoul
system
time
tolower
toupper
ungetc
vfprintf
user32
CloseClipboard
EmptyClipboard
FindWindowA
GetActiveWindow
GetCapture
GetClipboardOwner
GetCursorPos
GetForegroundWindow
GetLastActivePopup
GetQueueStatus
MessageBoxA
OpenClipboard
SendMessageA
SetClipboardData
Sections
.text Size: 334KB - Virtual size: 334KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 512B - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 5KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE