Static task
static1
Behavioral task
behavioral1
Sample
77890f1b96a9bd5cf6543c35f1f60240_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
77890f1b96a9bd5cf6543c35f1f60240_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
77890f1b96a9bd5cf6543c35f1f60240_NeikiAnalytics.exe
-
Size
26KB
-
MD5
77890f1b96a9bd5cf6543c35f1f60240
-
SHA1
c73e42743a9a2d2bd4a90bfd37b7370d730ff8a6
-
SHA256
270f8e6e7e7cb713e5ad808daca88b8c59a05b0a302e2320c04863024e37f6e9
-
SHA512
53226b905e11abf37e7b20a033d78b875333c197231956934a4640f69fd92b3d7e90c7f03ea53f8cc04a68c6ce91d6adcfe046e561afe6ec314dfef50816470d
-
SSDEEP
384:WQoEmqWUIncBpEzjvehWtFx7UJxlfS+Ui0MX97nw:WQEqsncbKjW8tz7axlfSri/Xxw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 77890f1b96a9bd5cf6543c35f1f60240_NeikiAnalytics.exe
Files
-
77890f1b96a9bd5cf6543c35f1f60240_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
26aee0b8d9bcfbd6cfab86ef0570a3fc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetMessageA
PostQuitMessage
DispatchMessageA
UpdateWindow
LoadCursorW
TranslateMessage
LoadBitmapA
CreateWindowExA
RegisterClassExA
DefWindowProcA
MessageBoxA
SendMessageA
LoadIconA
PostMessageA
SetWindowTextA
GetKeyboardState
ShowWindow
GetClassLongA
kernel32
HeapAlloc
GetProcessHeap
GetModuleHandleA
HeapCreate
DeleteFileA
HeapFree
HeapReAlloc
SetFilePointer
WriteFile
ReadFile
CreateFileA
gdi32
GetStockObject
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.htext Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE