Static task
static1
Behavioral task
behavioral1
Sample
5977dc0214706b945d49bca792dd6385299979f5ce230011b69328d804160040_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5977dc0214706b945d49bca792dd6385299979f5ce230011b69328d804160040_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
5977dc0214706b945d49bca792dd6385299979f5ce230011b69328d804160040_NeikiAnalytics
-
Size
819KB
-
MD5
9cbba69704d8e5298b41c47f11902e60
-
SHA1
a93a5c49d97372dcd5d719cca9214016f65c3904
-
SHA256
5977dc0214706b945d49bca792dd6385299979f5ce230011b69328d804160040
-
SHA512
a97cc9777977842c0903b475c740109812de29941c44499cc556895ebb1fc214ea540c35b1b83fc2e9200518265f28474feb1a9cef4145b25e3723b3ccb2b5a6
-
SSDEEP
24576:FNGaEeo6BlnNZarSlFUevMDqnmuWIK2TOVy/AROa:FssNZarSlG6HnmuWIK2T8y/AROa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5977dc0214706b945d49bca792dd6385299979f5ce230011b69328d804160040_NeikiAnalytics
Files
-
5977dc0214706b945d49bca792dd6385299979f5ce230011b69328d804160040_NeikiAnalytics.exe windows:4 windows x86 arch:x86
6e3526d19a617c16adffe95ff271aa69
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileTime
SetFileAttributesA
CompareFileTime
GetFileAttributesA
lstrcmpA
GetVolumeInformationA
lstrcpyA
GetEnvironmentVariableA
GetModuleFileNameA
GetCurrentThreadId
GetUserDefaultLangID
GetVersionExA
GetModuleHandleA
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
SearchPathA
CreateDirectoryA
CompareStringA
IsDBCSLeadByte
DeleteFileA
FindResourceA
SizeofResource
LoadResource
LockResource
FreeResource
MultiByteToWideChar
lstrcpynA
lstrlenA
SetFileTime
GetStartupInfoA
LocalAlloc
CreateFileA
GetFileSize
SetLastError
SetFilePointer
GetLastError
LocalFree
CloseHandle
ReadFile
GetCurrentDirectoryA
WriteFile
user32
GetSystemMetrics
SetWindowTextA
SendDlgItemMessageA
SetFocus
KillTimer
UnhookWindowsHookEx
SetWindowsHookExA
GetClassInfoA
CharLowerA
SetTimer
IsIconic
DestroyIcon
MoveWindow
SendMessageA
DrawIcon
ReleaseDC
GetDC
GetDesktopWindow
EndPaint
GetDlgItem
EnableWindow
GetDlgItemTextA
PostMessageA
SetDlgItemTextA
PeekMessageA
IsDialogMessageA
BeginPaint
LoadIconA
TranslateMessage
DispatchMessageA
wsprintfA
CharNextA
CharPrevA
EndDialog
MessageBoxA
GetWindowLongA
CallNextHookEx
DialogBoxIndirectParamA
SystemParametersInfoA
GetWindowRect
CharUpperA
gdi32
GetMapMode
SetMapMode
GetStockObject
GetDeviceCaps
GetObjectA
comdlg32
GetFileTitleA
GetOpenFileNameA
advapi32
RegQueryValueExA
RegCreateKeyA
RegSetValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
shell32
ShellExecuteA
crtdll
_fmode_dll
_global_unwind2
exit
_commode_dll
_local_unwind2
strchr
strrchr
atoi
_exit
_XcptFilter
_acmdln_dll
_initterm
__GetMainArgs
Sections
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 181B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ