Static task
static1
Behavioral task
behavioral1
Sample
e83881b183bd48da0967133ba6f8b2f0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e83881b183bd48da0967133ba6f8b2f0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
e83881b183bd48da0967133ba6f8b2f0_NeikiAnalytics.exe
-
Size
226KB
-
MD5
e83881b183bd48da0967133ba6f8b2f0
-
SHA1
fb7eca763ac53a90a58796f65a4bbdc0011a4fa0
-
SHA256
4b1f17054493e6d73b6ad6842f71e7e8626c9251b2df0ff28474e6830d36b0e4
-
SHA512
3c4da591f0eae0e7e17c3f3a803b6e914e05bc2356f88cd6f31e85c04f6904a0c6254930ea96edbfdc2296c7977d96542f6010c4316da40a90c2f76012729add
-
SSDEEP
6144:KpHAVnaMCpnW/H0LqHnmIBV+UdvrEFp7hKl:K+VnKRWH8qHNBjvrEH7+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e83881b183bd48da0967133ba6f8b2f0_NeikiAnalytics.exe
Files
-
e83881b183bd48da0967133ba6f8b2f0_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
958939e354233a1fddec6d8fce8d3cfe
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
FindExecutableA
user32
ShowWindow
DefWindowProcA
BeginPaint
GetSysColor
GetClientRect
SetRect
EndPaint
SetWindowWord
GetWindowWord
RegisterClassA
OemToCharA
OemToCharBuffA
LoadCursorA
DestroyWindow
SetWindowTextA
SendMessageA
EnableWindow
PostMessageA
GetLastActivePopup
SetWindowPos
SetTimer
KillTimer
DialogBoxIndirectParamA
GetWindowRect
GetSystemMetrics
GetKeyState
PeekMessageA
TranslateMessage
DispatchMessageA
GetParent
SetDlgItemTextA
SendDlgItemMessageA
GetDlgItem
InvalidateRect
UpdateWindow
wsprintfA
MessageBoxA
SetCursor
GetDlgItemTextA
EndDialog
kernel32
CreateDirectoryA
GetVolumeInformationA
_lclose
GlobalFree
RtlUnwind
GetCommandLineA
GetModuleHandleA
SetErrorMode
GetVersion
LoadLibraryA
GetProcAddress
GetModuleFileNameA
FreeLibrary
lstrcmpiA
GetEnvironmentVariableA
GetWindowsDirectoryA
LocalAlloc
LocalFree
GlobalUnlock
GlobalHandle
_lopen
GlobalAlloc
GlobalLock
WinExec
_llseek
GetDriveTypeA
lstrcatA
_lread
_lwrite
FindClose
FindFirstFileA
GetCurrentDirectoryA
SetCurrentDirectoryA
lstrlenA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
_lcreat
lstrcpyA
gdi32
SetTextColor
SetTextAlign
GetTextExtentPoint32A
GetBkColor
DeleteObject
SetBkColor
ExtTextOutA
CreateDCA
GetDeviceCaps
CreateFontIndirectA
DeleteDC
SelectObject
advapi32
RegQueryValueA
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 146B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ