Static task
static1
Behavioral task
behavioral1
Sample
60f70f7d2c615df13da04d27b9044d20_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
60f70f7d2c615df13da04d27b9044d20_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
60f70f7d2c615df13da04d27b9044d20_NeikiAnalytics.exe
-
Size
64KB
-
MD5
60f70f7d2c615df13da04d27b9044d20
-
SHA1
f4633bb5e897e659c188dced2eb3580adc14c72f
-
SHA256
7ff702ecfbff73f560c66f6f3d822c7daa753a9f6f383f6863c463c241c8ba9e
-
SHA512
6be49a572d5a78ea7997a7d3f3d07001a7946e05d8597ab33e998819c40f9fd45a77ab8313e5efeaf0111cf419588519dab67c6c168e03edbdb2e1f2e8a37896
-
SSDEEP
768:08nTknd43Z/MePrX4LrbcuAxR9PrSIyl9KU7ypK4qXD:FUdm5M1Lw9Prr67WKpz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 60f70f7d2c615df13da04d27b9044d20_NeikiAnalytics.exe
Files
-
60f70f7d2c615df13da04d27b9044d20_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
6839461db8acfb32287fe93e9bf92edf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
lstrcpyA
lstrcatA
IsDBCSLeadByte
LoadLibraryA
InterlockedIncrement
GetStringTypeA
LCMapStringW
LCMapStringA
SetStdHandle
GetLastError
lstrcpynA
LoadLibraryExA
SizeofResource
FindResourceA
LoadResource
GetModuleHandleA
FreeLibrary
WideCharToMultiByte
lstrlenW
GetShortPathNameA
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
GetStdHandle
lstrcmpiA
GetCommandLineA
GetModuleFileNameA
lstrlenA
CloseHandle
GetStringTypeW
GetCurrentThreadId
FlushFileBuffers
IsBadCodePtr
GetOEMCP
GetStartupInfoA
InterlockedDecrement
GetACP
GetCPInfo
SetFilePointer
SetUnhandledExceptionFilter
WriteFile
RtlUnwind
GetFileType
GetEnvironmentVariableA
GetVersionExA
GetEnvironmentStringsW
GetEnvironmentStrings
SetHandleCount
FreeEnvironmentStringsA
LocalFree
HeapFree
HeapAlloc
HeapReAlloc
HeapDestroy
GetVersion
ExitProcess
RaiseException
UnhandledExceptionFilter
FreeEnvironmentStringsW
HeapCreate
VirtualFree
VirtualAlloc
TerminateProcess
GetCurrentProcess
user32
MessageBoxA
LoadStringA
CharNextA
PostThreadMessageA
GetMessageA
DispatchMessageA
advapi32
ControlService
StartServiceCtrlDispatcherA
RegEnumValueA
RegQueryInfoKeyA
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyExA
CreateServiceA
RegOpenKeyExA
DeleteService
RegSetValueExA
RegCloseKey
RegDeleteValueA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegQueryValueExA
ReportEventA
DeregisterEventSource
RegisterEventSourceA
OpenServiceA
CloseServiceHandle
OpenSCManagerA
ole32
ProgIDFromCLSID
CoTaskMemFree
OleRegGetUserType
CoUninitialize
CoInitialize
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoRegisterClassObject
CoRevokeClassObject
CLSIDFromProgID
OleRun
oleaut32
LoadTypeLi
RegisterTypeLi
VarUI4FromStr
SysAllocString
SysFreeString
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ