Static task
static1
Behavioral task
behavioral1
Sample
ed0bbb63cb7aec34bc524f3f25879c00_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ed0bbb63cb7aec34bc524f3f25879c00_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
ed0bbb63cb7aec34bc524f3f25879c00_NeikiAnalytics.exe
-
Size
19KB
-
MD5
ed0bbb63cb7aec34bc524f3f25879c00
-
SHA1
394b7dbc73e40703a7b046b679235a616ec3fbbf
-
SHA256
afd6a28f0b9e57a5ae0946e5894c66142783d136ce8224276184826cf168d7ed
-
SHA512
408299dcc381476a989cde5bf7ddde6b2f1a4d1c1b66cebdde6432f0fd16c99d5c7fb2d77092161179fe572ffdaa95e0288b3ade458b52e6fad37510abc448b1
-
SSDEEP
384:YpIT5mv2W8EfxKOx0hyWQ9Xc0Tw7fA4xiUkY:Y85mv2WHEOx0hyWQs7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ed0bbb63cb7aec34bc524f3f25879c00_NeikiAnalytics.exe
Files
-
ed0bbb63cb7aec34bc524f3f25879c00_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
5f15908da5076b9866aa29d4bc303edd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DispatchMessageW
TranslateMessage
GetMessageW
LoadBitmapA
CreateWindowExA
RegisterClassExA
DefWindowProcA
MessageBoxA
SendMessageA
LoadIconA
PostMessageA
GetKeyboardState
PostQuitMessage
GetClassLongA
kernel32
HeapAlloc
GetProcessHeap
GetModuleHandleA
FindFirstFileA
FindClose
FindNextFileA
DeleteFileA
HeapFree
SetFilePointer
WriteFile
ReadFile
CreateFileA
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 516B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ