Static task
static1
Behavioral task
behavioral1
Sample
d613e13f67bf4054e8aa6dd5e287dfd0_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
d613e13f67bf4054e8aa6dd5e287dfd0_NeikiAnalytics.exe
-
Size
1.5MB
-
MD5
d613e13f67bf4054e8aa6dd5e287dfd0
-
SHA1
1c8c594abeb47bad3382d74d8faf7ba7691008b6
-
SHA256
8bc25b017a2361b8c9c17c8cf98928be7ad5cdea9dc47f294370d1f78b087e1b
-
SHA512
8784ed84e4a1e8c78731fe9e854ff0c42135edf3b4f59cf6289431dec817cb0b772b80a83d0f950bf5272b5f9131aded392201f80863bda3253317eb47a1b277
-
SSDEEP
49152:5DmZio+wLYxJYIJTcIU3fWbwkQ/qoLEw:5DmZuwLYxeJqo4w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d613e13f67bf4054e8aa6dd5e287dfd0_NeikiAnalytics.exe
Files
-
d613e13f67bf4054e8aa6dd5e287dfd0_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
c65c63d8c523e5191dbbeed74a83acff
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoTaskMemAlloc
IIDFromString
StringFromGUID2
OleInitialize
OleUninitialize
OleRun
OleSetContainedObject
CoInitializeEx
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitialize
shell32
FindExecutableA
Shell_NotifyIconA
ShellExecuteExA
SHGetFolderPathW
SHGetFolderPathA
wininet
InternetGetConnectedState
InternetTimeToSystemTime
InternetCrackUrlA
InternetTimeFromSystemTime
HttpQueryInfoA
HttpOpenRequestA
InternetErrorDlg
InternetOpenA
InternetCloseHandle
HttpSendRequestA
InternetConnectA
InternetReadFile
user32
GetWindowThreadProcessId
GetFocus
IsChild
SetFocus
SetRect
GetWindowLongW
DefWindowProcW
GetSystemMenu
AdjustWindowRectEx
GetWindowRect
LoadCursorA
GetDC
SetWindowPos
CreateWindowExW
SetWindowTextW
RegisterClassExW
SendMessageA
MessageBoxA
RegisterClassExA
SetWindowLongW
GetClientRect
GetDesktopWindow
EnableMenuItem
GetClassInfoExW
TrackPopupMenu
ShowWindow
GetParent
ReleaseDC
wsprintfA
GetMessageW
GetMessageA
LoadImageA
DispatchMessageA
DestroyWindow
LoadStringA
PostMessageA
GetSystemMetrics
DispatchMessageW
CreatePopupMenu
SetWindowLongA
GetAncestor
CharNextA
GetCursorPos
SetForegroundWindow
IsWindowUnicode
PostQuitMessage
PeekMessageA
AppendMenuA
TranslateMessage
CreateWindowExA
DefWindowProcA
RegisterClassA
GetWindowLongA
MsgWaitForMultipleObjectsEx
comctl32
InitCommonControlsEx
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueW
kernel32
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InitializeSListHead
RtlUnwind
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualQuery
GetFileType
GetConsoleCP
GetConsoleMode
GetStdHandle
GetModuleFileNameW
WriteConsoleW
ExitThread
GetDriveTypeW
GetFileInformationByHandle
SystemTimeToTzSpecificLocalTime
GetFullPathNameW
SetStdHandle
HeapAlloc
HeapFree
FreeLibraryAndExitThread
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapSize
HeapReAlloc
GetFileSizeEx
FlushFileBuffers
GetTimeZoneInformation
ReadConsoleW
GetCurrentDirectoryW
FindFirstFileExW
FindNextFileW
IsValidCodePage
CreateDirectoryW
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
lstrcmpA
GetModuleHandleA
GetLastError
RaiseException
DecodePointer
DeleteCriticalSection
SetEnvironmentVariableW
SizeofResource
LoadLibraryExA
FindResourceA
CreateMutexA
GetCommandLineA
MultiByteToWideChar
SetDllDirectoryA
CloseHandle
IsDBCSLeadByte
LoadResource
GetProcAddress
FreeLibrary
WideCharToMultiByte
lstrcmpiA
lstrlenA
WaitForSingleObject
DeleteFileA
LocalFree
FormatMessageA
GetExitCodeProcess
WaitForMultipleObjects
lstrcatA
SetEvent
lstrcpyA
CreateThread
ResetEvent
CreateEventA
lstrcpynA
OpenEventA
WriteFile
Sleep
CreateFileA
GetSystemTime
GetCurrentProcess
GetTempPathA
ReadFile
FileTimeToSystemTime
SystemTimeToFileTime
MulDiv
LocalAlloc
GetCurrentThreadId
SetEndOfFile
SetFilePointerEx
FindFirstFileA
TerminateProcess
FindClose
GetSystemDirectoryA
LockResource
GetWindowsDirectoryA
ExitProcess
FormatMessageW
GetLocalTime
GetCurrentProcessId
SetLastError
FindNextFileA
GetFileAttributesA
MoveFileExA
SetFileAttributesA
RemoveDirectoryA
CreateDirectoryA
GetTickCount
GetCommandLineW
GetModuleHandleExW
GetProcessHeap
GetNativeSystemInfo
SetHandleInformation
CreatePipe
PeekNamedPipe
CreateProcessA
GetSystemDefaultUILanguage
GetThreadLocale
GetUserDefaultUILanguage
GetModuleHandleExA
LoadLibraryW
GetExitCodeThread
OpenThread
OpenMutexA
LoadLibraryExW
ReleaseMutex
QueryPerformanceFrequency
QueryPerformanceCounter
CreateFileW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetStringTypeW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
GetModuleFileNameA
advapi32
CryptDestroyHash
CryptGetHashParam
RegDeleteValueA
RegEnumKeyExA
CryptHashData
CryptCreateHash
RegQueryValueExA
CryptAcquireContextA
RegEnumKeyA
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegQueryInfoKeyW
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
CryptReleaseContext
oleaut32
SysFreeString
VarUI4FromStr
VariantClear
VariantChangeType
VariantCopy
VariantInit
SysStringByteLen
GetErrorInfo
SysAllocString
shlwapi
ord12
gdi32
GetDeviceCaps
GetStockObject
wintrust
WinVerifyTrust
crypt32
CryptProtectData
CryptUnprotectData
CryptBinaryToStringA
CryptStringToBinaryA
CertGetNameStringW
CryptMsgClose
CryptQueryObject
CertCloseStore
CryptMsgGetParam
CertFindCertificateInStore
msi
ord91
ord160
ord31
ord168
ord117
ord137
ord189
ord159
ord115
ord141
ord44
ord67
ord8
ord158
ord204
Sections
.text Size: 488KB - Virtual size: 488KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 181KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 273KB - Virtual size: 273KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 600KB - Virtual size: 604KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE