Behavioral task
behavioral1
Sample
ebdbc72d63c2808fd0c7ef09f0100f80_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ebdbc72d63c2808fd0c7ef09f0100f80_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
ebdbc72d63c2808fd0c7ef09f0100f80_NeikiAnalytics.exe
-
Size
126KB
-
MD5
ebdbc72d63c2808fd0c7ef09f0100f80
-
SHA1
3a79f335f225f46eed7529f4cbbc591afa3764d0
-
SHA256
f35057d580c45083e59e5a5b93689101d6762226a62d812ba193a39a0c7243d9
-
SHA512
7edffa5a222f2520c4d07dff30bae9fd18b170dff2bd577ab3a28bbed7e6dac22a9f61f6ff83503dc420dc757a6ecbf8c3da4e7dd9516b7115253f2c95d41b71
-
SSDEEP
3072:q8ZCvutdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7Zsuk:qxvutdgI2MyzNORQtOfl1qNVo7R+S+Nk
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ebdbc72d63c2808fd0c7ef09f0100f80_NeikiAnalytics.exe
Files
-
ebdbc72d63c2808fd0c7ef09f0100f80_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
3db2c1aad06d38a08f2119d789a12991
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTimeAsFileTime
CreateFileA
GetLastError
GetModuleHandleA
GetCommandLineA
GetCurrentDirectoryA
lstrcmpA
lstrlenA
GetTickCount
GetCurrentProcessId
GetCurrentProcess
gdi32
CreateCompatibleBitmap
CreateCompatibleDC
DeleteObject
user32
SendMessageA
ShowWindow
MessageBoxA
PostQuitMessage
GetMessageA
EndPaint
DispatchMessageA
BeginPaint
TranslateMessage
MoveWindow
CreateWindowExA
RegisterClassExA
DefWindowProcA
DestroyWindow
LoadIconA
UpdateWindow
LoadCursorA
Sections
UPX0 Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE