Static task
static1
Behavioral task
behavioral1
Sample
ea4ee4b17a0e0f1e266ff65376249ca0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ea4ee4b17a0e0f1e266ff65376249ca0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
ea4ee4b17a0e0f1e266ff65376249ca0_NeikiAnalytics.exe
-
Size
224KB
-
MD5
ea4ee4b17a0e0f1e266ff65376249ca0
-
SHA1
28da58895ee3c70df9c277e15f1ee79162115e25
-
SHA256
c40e402e116e1765ee12490e9f42f1a11b228033355f13041042648110a85d93
-
SHA512
2d0cbfe794f968afa84784ea5948a1d66837a64506f4edd1e4ef0ad821bb6a0b98718d8a6377423058d2e8951fdae937e8c917a467a6705e180fd408e9677a43
-
SSDEEP
3072:2lcai25wotZh2K715azG647BUGVESFfx9wleLjpdBG3oD7bpQJB5AB/s4:GiI715cG647xFhwli5bpQJB5AB/x
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea4ee4b17a0e0f1e266ff65376249ca0_NeikiAnalytics.exe
Files
-
ea4ee4b17a0e0f1e266ff65376249ca0_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
9c9b1ecc0d5e0f1bcbfefb55ea610d4c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
TerminateThread
OpenProcess
DeleteFileA
GlobalAlloc
CompareStringW
CompareStringA
SetEndOfFile
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetStdHandle
RtlUnwind
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
WriteFile
GetFullPathNameA
VirtualAlloc
GetCurrentThread
HeapCreate
HeapDestroy
SetFilePointer
GetCurrentProcess
TerminateProcess
ReadFile
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetSystemTime
GetTimeZoneInformation
MoveFileA
HeapReAlloc
FindFirstFileA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
HeapAlloc
HeapFree
SetThreadPriority
GetCurrentDirectoryA
CreateMutexA
GetLastError
CreateThread
WaitForSingleObject
GlobalLock
GlobalUnlock
CreateFileA
FreeLibrary
CloseHandle
SetCurrentDirectoryA
ReleaseMutex
GetLocalTime
GetModuleHandleA
GetModuleFileNameA
Sleep
CreateProcessA
GetTickCount
LoadLibraryA
GetProcAddress
VirtualFree
SetEnvironmentVariableA
user32
GetWindowTextA
SetWindowPos
SendMessageA
GetForegroundWindow
SetWindowTextA
SetForegroundWindow
CloseClipboard
GetClipboardData
OpenClipboard
IsClipboardFormatAvailable
GetWindowPlacement
KillTimer
SetCursorPos
ClientToScreen
wsprintfA
FindWindowA
ReleaseDC
GetDC
EmptyClipboard
SetClipboardData
GetParent
MoveWindow
SetCapture
ReleaseCapture
PostMessageA
PeekMessageA
GetUpdateRect
BeginPaint
EndPaint
InvalidateRect
GetCursorPos
ScreenToClient
GetDesktopWindow
GetWindowRect
GetClientRect
UpdateWindow
LoadCursorA
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
DefWindowProcA
GetWindowThreadProcessId
MessageBoxA
ShowWindow
SetFocus
SetTimer
gdi32
Rectangle
BitBlt
DeleteDC
CreateDIBitmap
IntersectClipRect
SelectClipRgn
SetBkMode
TextOutA
GetTextExtentExPointA
GetTextExtentPoint32A
Polygon
PatBlt
MoveToEx
LineTo
SetTextColor
CreatePen
CreateSolidBrush
SelectObject
DeleteObject
GetStockObject
CreateCompatibleDC
comdlg32
GetOpenFileNameA
GetSaveFileNameA
shell32
ShellExecuteA
SHGetPathFromIDListA
SHBrowseForFolderA
winmm
PlaySoundA
ws2_32
WSACleanup
gethostbyname
htons
socket
send
recv
shutdown
closesocket
WSAStartup
connect
madcodehooklib
ord10
Sections
.text Size: 164KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 267KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ