Behavioral task
behavioral1
Sample
a996d7baa6b7feafb2e61408fcbd7910_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a996d7baa6b7feafb2e61408fcbd7910_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
a996d7baa6b7feafb2e61408fcbd7910_NeikiAnalytics.exe
-
Size
6.3MB
-
MD5
a996d7baa6b7feafb2e61408fcbd7910
-
SHA1
c11da845d9082b67022c63cb976b0bac0b557577
-
SHA256
b6d4f20293fbfb702d59cd766fefa8db4360c1c6dcbb2126902aeebcb019b3e0
-
SHA512
ad6b59fa5202a33bda033f7606dc35fd608673cc060145299649da3e8cafd2b027671a4100ca1a38653bcbd4f4b1e4a34c043a8d1712279158ce144c8a1b30ae
-
SSDEEP
98304:D9Xjgk6yyUoXOSDA3FRMpEMi30fd62q+ktNNND5aR9UNLCpm7GeNUiNcmf:HyUywIpu30V6lgUNep8NXz
Malware Config
Signatures
-
resource yara_rule sample themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a996d7baa6b7feafb2e61408fcbd7910_NeikiAnalytics.exe
Files
-
a996d7baa6b7feafb2e61408fcbd7910_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 640KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 96KB - Virtual size: 270KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 191KB - Virtual size: 360KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 41KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.themida Size: - Virtual size: 6.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 5.3MB - Virtual size: 5.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 16B - Virtual size: 4KB
IMAGE_SCN_MEM_READ