Static task
static1
Behavioral task
behavioral1
Sample
271d44876be1861a1e4bd3b370768d60_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
271d44876be1861a1e4bd3b370768d60_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
271d44876be1861a1e4bd3b370768d60_NeikiAnalytics.exe
-
Size
88KB
-
MD5
271d44876be1861a1e4bd3b370768d60
-
SHA1
96df49c6eaa706b06f115a60cc1c7e99fa1b6341
-
SHA256
4ca8f3d7de9bc905ad623c44ae42b9fa73d04da459609b5d3a9a7d32a72f8fb8
-
SHA512
9bac670b3dcbef6c62d3d88f65aac7ff25bb5ba06b0fe681268b89dccf95f9963249b5e37fede8dc28cd491e890d0c4f8227fc83e179eb93df26e4443f961d35
-
SSDEEP
768:KKp1NUtlkxTBPW5yX9x3K0gZ/sBoTe+bs5i9pR21tPg:KZmDK0gwIp4W
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 271d44876be1861a1e4bd3b370768d60_NeikiAnalytics.exe
Files
-
271d44876be1861a1e4bd3b370768d60_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
afc077b3c2f8782d9a7d278fff656cae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord516
ord518
ord553
ord595
ord520
ord709
ord632
ord526
EVENT_SINK_AddRef
ord528
ord529
DllFunctionCall
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord608
ord716
ProcCallEngine
ord576
ord577
ord100
ord610
ord612
ord613
ord617
ord619
ord542
ord547
Sections
.text Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
XOR Size: 4KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE