Static task
static1
Behavioral task
behavioral1
Sample
df3190dfe5efd552ee4403d9ad5fcca0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
df3190dfe5efd552ee4403d9ad5fcca0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
df3190dfe5efd552ee4403d9ad5fcca0_NeikiAnalytics.exe
-
Size
737KB
-
MD5
df3190dfe5efd552ee4403d9ad5fcca0
-
SHA1
e86169774b4ecd9df38bdef9485cd0a7e4b726a0
-
SHA256
ab23a9c3a9cb3150257147b17cdedfc1d6159cfc5388a539905792845fbf8331
-
SHA512
07474b74c2d2bc2f7d52da6e5822f93df8ac3605bd8e23d00586f595fc5f7ebf31cfa4cda1aeb35618a78dbacb3b5c2742e9b4a8feb59393e1a781783babc6ac
-
SSDEEP
12288:a7BsO/DzqAWJb3OQVTDDbXxo0fUs+h2sMrvIpxCcwnDPA9W743HaZ:aNsincTTDDbXrIARJr43Ha
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource df3190dfe5efd552ee4403d9ad5fcca0_NeikiAnalytics.exe
Files
-
df3190dfe5efd552ee4403d9ad5fcca0_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
aa720ae8a0a5abc72b345636e6fc43e5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetTapeParameters
SetCalendarInfoA
GetHandleInformation
EnumDateFormatsA
GetPrivateProfileStructW
CreateHardLinkA
GetThreadSelectorEntry
GetUserDefaultLCID
SetNamedPipeHandleState
CreateSemaphoreA
GetModuleHandleA
SetFileAttributesA
GlobalFree
WaitForMultipleObjects
LocalShrink
ResetEvent
CreateDirectoryExW
GetLocaleInfoW
SetMessageWaitingIndicator
RtlZeroMemory
GetDevicePowerState
CallNamedPipeW
CompareFileTime
IsBadHugeWritePtr
SetHandleInformation
VerifyVersionInfoA
GetLogicalDriveStringsA
GetAtomNameW
GetDefaultCommConfigW
SetMailslotInfo
FindResourceExW
InterlockedCompareExchange
IsBadCodePtr
GetSystemDefaultUILanguage
GetPrivateProfileSectionNamesW
WriteFile
GetSystemDefaultLCID
ReleaseSemaphore
FreeEnvironmentStringsA
GlobalGetAtomNameA
GetProcessHeaps
WaitNamedPipeW
WaitForSingleObjectEx
SetLocalTime
GetLongPathNameW
InterlockedIncrement
DosDateTimeToFileTime
_hwrite
CommConfigDialogW
OpenSemaphoreW
SetFileApisToANSI
DeleteFileA
ResetWriteWatch
GetTempFileNameA
GetSystemDefaultLangID
GlobalHandle
TlsFree
OutputDebugStringA
GetFileAttributesA
DeleteVolumeMountPointW
CreateEventA
SetFileApisToOEM
LocalLock
TlsGetValue
MulDiv
IsProcessorFeaturePresent
GetTempPathA
WritePrivateProfileStringA
GetLocaleInfoA
DuplicateHandle
GetProcessShutdownParameters
GetTickCount
GetQueuedCompletionStatus
EnumLanguageGroupLocalesA
GlobalAlloc
GetExitCodeThread
CreateTimerQueue
FindVolumeClose
QueryPerformanceCounter
IsDBCSLeadByteEx
BindIoCompletionCallback
SetThreadLocale
PurgeComm
lstrcmpiW
QueueUserAPC
FindNextVolumeA
FreeLibrary
QueryPerformanceFrequency
MoveFileExW
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegOpenKeyExW
RegCreateKeyExW
RegQueryValueExW
RegSetValueExW
comctl32
InitCommonControlsEx
user32
GetDlgItem
IntersectRect
ShowWindow
FrameRect
RegisterClassW
SetCapture
GetDesktopWindow
EndPaint
GetSystemMetrics
SetDlgItemTextW
FillRect
DispatchMessageW
LoadBitmapW
UnionRect
ReleaseDC
WinHelpW
GetSubMenu
GetWindowPlacement
DrawMenuBar
InvalidateRect
PtInRect
MoveWindow
DrawTextW
OffsetRect
CreateWindowExW
LoadStringA
ReleaseCapture
IsIconic
SendMessageW
GetWindowRect
DefWindowProcW
EnableMenuItem
MessageBoxW
SetRect
GetDlgItemTextW
UpdateWindow
DestroyWindow
LoadCursorW
GetMessageW
CallWindowProcW
GetClientRect
LoadIconW
TranslateAcceleratorW
LoadAcceleratorsW
PeekMessageW
WaitMessage
InvertRect
EndDialog
CheckRadioButton
DialogBoxParamW
wsprintfW
GetForegroundWindow
IsZoomed
BeginPaint
GetDC
GetMenu
PostMessageW
IsDlgButtonChecked
CheckDlgButton
MessageBoxA
shlwapi
PathAppendA
PathCanonicalizeA
Sections
.text Size: 241KB - Virtual size: 241KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 253KB - Virtual size: 641KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 212KB - Virtual size: 211KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ