Static task
static1
Behavioral task
behavioral1
Sample
7b3fc7930cd4540b1db461d1438ee6a0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7b3fc7930cd4540b1db461d1438ee6a0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
7b3fc7930cd4540b1db461d1438ee6a0_NeikiAnalytics.exe
-
Size
205KB
-
MD5
7b3fc7930cd4540b1db461d1438ee6a0
-
SHA1
7ca1762c61453d621b599f5b60c9fd9b3114b49a
-
SHA256
c716728897b8a5b9894b065d6d793d687041cb06dee170a69a82ae8f75c91b3b
-
SHA512
18b54c29d1c97f47d2729f6596d289208d58d3bee671518574131c83a6134426a26746713af62e21f15e497dcf878851db43c2b7428ed6d5965748080291367a
-
SSDEEP
3072:57VD4DUHnNZkfOP6sfIOpJ9C3hPlGxt1UhRkgyankTIzfwAYzWcXCyqT36zhRRKy:rzHnMLm5GNGxHUhtnkdpHqTKzhh8i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7b3fc7930cd4540b1db461d1438ee6a0_NeikiAnalytics.exe
Files
-
7b3fc7930cd4540b1db461d1438ee6a0_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
616d060f84174fbe550615d295f4ce51
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLocaleInfoA
lstrcpyn
CreateNamedPipeA
GetEnvironmentVariableA
GetExitCodeThread
OpenEventW
GetLogicalDriveStringsA
CopyFileExW
SetPriorityClass
GetProcAddress
CreateMutexA
CreateMutexW
QueryPerformanceCounter
CreateThread
SetUnhandledExceptionFilter
OpenMutexW
GetExitCodeProcess
GlobalGetAtomNameA
GetFileTime
GetCalendarInfoA
MulDiv
CreateFileMappingW
CreateMailslotA
FreeResource
LocalFree
DeleteAtom
GetVolumeInformationA
RaiseException
AddAtomA
GlobalFindAtomW
RemoveDirectoryW
GlobalFindAtomA
CreateMailslotW
GetProcessHeaps
EndUpdateResourceA
CopyFileExA
CreateNamedPipeW
SleepEx
GetModuleHandleA
WaitForSingleObject
GetSystemDefaultLangID
SetEvent
TlsAlloc
SetCalendarInfoW
GetLastError
GetFileSize
lstrlen
DuplicateHandle
GetAtomNameW
GetStringTypeW
CreateFileA
user32
CheckMenuItem
GetDC
DefDlgProcW
BringWindowToTop
GetDlgItem
EnumWindows
PeekMessageW
SetCursor
GetWindowLongA
MessageBoxIndirectW
CreatePopupMenu
keybd_event
GetWindowTextLengthA
gdi32
CreateFontIndirectExA
CreatePolygonRgn
CreateDIBitmap
GetLogColorSpaceW
SetGraphicsMode
GdiGetBatchLimit
ScaleWindowExtEx
SelectObject
GetEnhMetaFileHeader
GetFontData
SetLayout
SetRectRgn
ExtSelectClipRgn
EnumFontFamiliesA
GetAspectRatioFilterEx
GetNearestPaletteIndex
PolylineTo
PatBlt
SelectClipRgn
advapi32
RegEnumValueW
RegReplaceKeyA
RegCreateKeyW
RegQueryValueA
RegCreateKeyExA
RegReplaceKeyW
RegCloseKey
shlwapi
PathGetArgsW
ChrCmpIA
StrSpnW
PathAddBackslashW
PathIsUNCA
SHRegOpenUSKeyW
PathIsPrefixA
PathCompactPathExA
comctl32
FlatSB_SetScrollRange
InitCommonControls
winspool.drv
AddFormW
EnumMonitorsW
OpenPrinterW
GetJobW
DeleteMonitorA
EndDocPrinter
AddPrinterConnectionW
SetPrinterDataExW
inetcomm
MimeOleParseRfc822Address
MimeOleParseRfc822AddressW
HrGetAttachIcon
EssSecurityLabelEncodeEx
MimeOleGetDefaultCharset
MimeOleGetFileExtension
HrAttachDataFromFile
EssKeyExchPreferenceEncodeEx
EssSignCertificateDecodeEx
MimeOleSMimeCapGetHashAlg
EssKeyExchPreferenceDecodeEx
MimeOleGetCharsetInfo
MimeOleGetCertsFromThumbprints
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.j Size: 1KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nkytZ Size: 1024B - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.N Size: 3KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fc Size: 1KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.s Size: 2KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.w Size: 2KB - Virtual size: 191KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1022B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ