Static task
static1
Behavioral task
behavioral1
Sample
fd7ee0e04116c9995dc33463c9df9d90_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fd7ee0e04116c9995dc33463c9df9d90_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
fd7ee0e04116c9995dc33463c9df9d90_NeikiAnalytics.exe
-
Size
206KB
-
MD5
fd7ee0e04116c9995dc33463c9df9d90
-
SHA1
09bf4e2def0a4410b8827a245050b477a357d369
-
SHA256
053d1c5ae767f9ea1c14b08c547ec8d665750e8c14993dc1491f12fddc14bcc7
-
SHA512
a33244576c53c977198884131735a958cb684136edecad0bd2c5d8951acacc3d146f95582f83d666f8823c456796f01a7a1a93207888e58128b7c06c0d328cc8
-
SSDEEP
6144:f+EqFQ9A9ty5bhJcrs0MurPw/c4hd/B/coyXT3nOGX6T+:f+U9qyFhJy56d/eoyXjn9W+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fd7ee0e04116c9995dc33463c9df9d90_NeikiAnalytics.exe
Files
-
fd7ee0e04116c9995dc33463c9df9d90_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
e7f2d5507b09bfb1c824fe29a99d8a60
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DosDateTimeToFileTime
GetSystemDirectoryW
WriteFile
GetProcAddress
CreateFileA
GetModuleHandleA
CreateDirectoryA
FileTimeToSystemTime
IsBadStringPtrA
GetSystemDirectoryA
GetTimeFormatA
lstrcpyn
LocalAlloc
OpenWaitableTimerA
EnumCalendarInfoA
GetNamedPipeInfo
IsValidCodePage
user32
EnumChildWindows
GetSysColor
DialogBoxParamA
CreateMenu
EnumDesktopsA
GetClassNameA
CharNextA
ReleaseDC
RegisterWindowMessageA
EnumWindows
InvalidateRgn
SetWindowLongA
ShowCursor
CreateAcceleratorTableW
GetCaretPos
SetFocus
UnregisterClassW
PeekMessageW
SetMenu
GetMenuItemInfoA
LoadImageA
SendMessageW
DialogBoxIndirectParamA
CopyRect
GetWindowRect
GetScrollPos
CopyImage
GetSysColorBrush
PostQuitMessage
CheckDlgButton
GetDC
IsWindowEnabled
FillRect
CharLowerA
CreateDesktopA
UpdateWindow
SetCapture
SendDlgItemMessageW
LoadBitmapW
CreateWindowExW
GetDlgItemTextA
DefDlgProcA
GetKeyboardType
DefWindowProcW
CloseWindow
DestroyIcon
SetActiveWindow
CharUpperW
gdi32
GetPixelFormat
GetMetaRgn
GetEnhMetaFilePaletteEntries
GetWorldTransform
GetTextExtentExPointA
GetPath
GetLogColorSpaceW
advapi32
RegOpenKeyExA
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegReplaceKeyA
RegEnumValueA
shell32
StrCmpNIA
StrRStrA
StrStrIA
winspool.drv
EnumPrinterDataA
AddPortW
DocumentPropertiesW
GetJobA
ConfigurePortA
AddMonitorA
EnumPrinterKeyA
EndPagePrinter
DocumentPropertySheets
inetcomm
MimeOleConvertEnrichedToHTML
MimeOleSMimeCapInit
MimeOleGetBodyPropW
MimeEditViewSource
DllGetClassObject
MimeOleCreateMessageParts
MimeOleCreateBody
HrGetDisplayNameWithSizeForFile
CreateIMAPTransport
HrFreeAttachData
HrGetLastOpenFileDirectoryW
MimeOleGetCodePageCharset
MimeEditDocumentFromStream
crypt32
CryptSignCertificate
CertCreateCRLContext
CryptMsgOpenToDecode
CertIsValidCRLForCertificate
CryptGetOIDFunctionAddress
CertAddEncodedCertificateToStore
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.dHGmL Size: 1KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.lzmjSu Size: 512B - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.YOSWO Size: 1KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sTDEgl Size: 2KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fwQO Size: 3KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.L Size: 512B - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.D Size: 1KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kubC Size: 1024B - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hkw Size: 1KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ