Static task
static1
Behavioral task
behavioral1
Sample
ef0c71bef5b7f2127340acd9784c7460_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ef0c71bef5b7f2127340acd9784c7460_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
ef0c71bef5b7f2127340acd9784c7460_NeikiAnalytics.exe
-
Size
4.0MB
-
MD5
ef0c71bef5b7f2127340acd9784c7460
-
SHA1
536f4a4715a088f173aa6a8ad5fff3366f62e17f
-
SHA256
36dbc2be926569014fad4258ef156bab976a24e12b44c3cc6c009bbd9df0c23f
-
SHA512
15d946f073df85142bc3097b438292fbcf7df86ec675908b7dd80dd7764b1144f147ef60e40cef72c7599ba660f98cc970729aeaad7b0dd52ce14577811a91bf
-
SSDEEP
49152:KnnuioejI2tF2VmuLyhCW8ecUgRnoGJo4umKodH8djc9tJzQ+N1uoXYzt4e0m1oW:KClPG4+TTolwvS9IkiqUuGDdHPZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ef0c71bef5b7f2127340acd9784c7460_NeikiAnalytics.exe
Files
-
ef0c71bef5b7f2127340acd9784c7460_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
b005614e66f5482b53c33148b5d977c2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
lstrcpyA
OpenProcess
WaitForSingleObject
TerminateProcess
CloseHandle
GetCurrentDirectoryA
SetCurrentDirectoryA
LoadLibraryA
GetProcAddress
FreeLibrary
ReadFile
SetFilePointer
GetStartupInfoA
ConnectNamedPipe
DisconnectNamedPipe
TerminateThread
CreateNamedPipeA
CreateThread
GetTempPathA
GetCurrentProcessId
ReadProcessMemory
VirtualQueryEx
VirtualProtectEx
WriteProcessMemory
GetFileTime
SetFileTime
DeleteFileA
RemoveDirectoryA
LockFile
SetFileAttributesA
GetFileSize
CreateFileA
WriteFile
lstrcatA
GetShortPathNameA
CreateProcessA
GetLastError
ResumeThread
GetModuleHandleA
GetModuleFileNameA
lstrlenA
lstrcpynA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
CreateDirectoryA
GetTempFileNameA
user32
EnumWindows
EnableWindow
GetWindowThreadProcessId
ShowWindow
EndDialog
DestroyWindow
BeginPaint
EndPaint
KillTimer
PostQuitMessage
DialogBoxParamA
DefWindowProcA
SetTimer
CreateWindowExA
UpdateWindow
PostMessageA
LoadIconA
RegisterWindowMessageA
LoadCursorA
RegisterClassExA
LoadStringA
FindWindowA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
ChangeDisplaySettingsA
EnumDisplaySettingsA
GetForegroundWindow
SetForegroundWindow
MessageBoxA
wsprintfA
IsWindowVisible
IsWindowEnabled
shell32
ShellExecuteA
msvcrt
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_XcptFilter
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_adjust_fdiv
_exit
_onexit
__dllonexit
vsprintf
_mbsnbcpy
_mbsinc
_strdup
strstr
strchr
_splitpath
_makepath
_beginthread
memmove
??2@YAPAXI@Z
??3@YAXPAX@Z
time
strtoul
strncmp
__CxxFrameHandler
malloc
free
realloc
mfc42
ord1200
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
GetUserNameA
ole32
CoCreateInstance
CoInitialize
CoUninitialize
CoTaskMemFree
StringFromCLSID
oleaut32
SysAllocStringLen
SysFreeString
Sections
.text Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 220KB - Virtual size: 217KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ