Static task
static1
Behavioral task
behavioral1
Sample
ad69264706799d77663efd85bd16def0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad69264706799d77663efd85bd16def0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
ad69264706799d77663efd85bd16def0_NeikiAnalytics.exe
-
Size
860KB
-
MD5
ad69264706799d77663efd85bd16def0
-
SHA1
e1cc1867b896d2ed25edbb101dacc976257477d5
-
SHA256
5f090debeb0e89273aa702813587cffb8e761a533a7a90af8c42dcadb8de4867
-
SHA512
c936cc2f72d3c42b175247a932ab6b72bea45d64ac2be669d7a7d4007c68582bf935bc1270673dbcec0ed6ba600984e6ad562050952b53bce5b569e20dfcae4c
-
SSDEEP
12288:Fp96phxvvzi/ZSPlupXzEn/gc8my2jPj:FD6phU+OEn/gr0Pj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad69264706799d77663efd85bd16def0_NeikiAnalytics.exe
Files
-
ad69264706799d77663efd85bd16def0_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
acd488badbe5a8247476ba0d9ce9ca83
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetModuleBaseNameW
EnumProcesses
EnumProcessModules
mfc71u
ord762
ord1086
ord3155
ord3204
ord1925
ord1271
ord1270
ord5633
ord2366
ord1894
ord4535
ord3677
ord4032
ord4008
ord6272
ord3795
ord6274
ord2054
ord5579
ord3800
ord6215
ord5378
ord3826
ord1911
ord2925
ord5220
ord5222
ord3942
ord4562
ord5226
ord5562
ord2832
ord4475
ord3327
ord757
ord6248
ord5379
ord5564
ord5565
ord1096
ord1049
ord2147
ord1121
ord605
ord2239
ord5209
ord3599
ord3635
ord5178
ord4206
ord4729
ord4884
ord2011
ord1662
ord1661
ord5908
ord1392
ord5148
ord5199
ord4256
ord3176
ord354
ord2985
ord1785
ord6061
ord6276
ord4574
ord4743
ord3590
ord3112
ord5942
ord3902
ord427
ord664
ord1957
ord5640
ord501
ord265
ord266
ord3280
ord1959
ord5118
ord577
ord776
ord293
ord774
ord4100
ord2282
ord3990
ord283
ord2460
ord2895
ord870
ord5558
ord6173
ord6167
ord280
ord1479
ord6111
ord282
ord2926
ord5231
ord347
ord2384
ord2394
ord2392
ord2390
ord2386
ord2409
ord2397
ord1647
ord1646
ord1590
ord1156
ord3927
ord2121
ord3383
ord5524
ord1058
ord2468
ord5398
ord4320
ord2009
ord1007
ord5096
ord566
ord1476
ord4101
ord4026
ord5414
ord896
ord1118
ord899
ord2311
ord1472
ord1542
ord1605
ord602
ord709
ord4119
ord572
ord760
ord3331
ord4255
ord4480
ord3943
ord2638
ord3703
ord3713
ord3712
ord2527
ord2640
ord2534
ord2856
ord2708
ord4301
ord2829
ord2725
ord2531
ord5196
ord1955
ord5171
ord1353
ord4961
ord3339
ord6275
ord3796
ord6273
ord1513
ord2163
ord2169
ord2399
ord2381
ord2379
ord2402
ord2407
ord2388
ord2404
ord931
ord927
ord929
ord925
ord920
ord5956
ord1591
ord4276
ord4716
ord3397
ord5210
ord4179
ord6271
ord5067
ord1899
ord4238
ord1393
ord3940
ord1608
ord1611
ord5911
ord3678
ord1079
ord764
ord334
ord593
ord3249
ord5119
ord1198
ord5229
msvcr71
_controlfp
__security_error_handler
_onexit
__dllonexit
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_amsg_exit
_wcmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
strlen
pow
memcmp
getenv
sscanf
sprintf
_iob
fprintf
_except_handler3
fflush
fwrite
fputc
strncmp
fseek
longjmp
_setjmp3
fopen
_wcsicmp
abs
fread
fclose
fabs
wcslen
_wtoi
wcschr
memcpy
strtok
malloc
memset
wcscpy
wcstok
free
__CxxFrameHandler
calloc
kernel32
GetStartupInfoW
ExitProcess
QueryPerformanceCounter
GetTickCount
GetModuleHandleA
GetCurrentProcessId
GetSystemTimeAsFileTime
GetVersionExA
DeleteCriticalSection
InitializeCriticalSection
_llseek
_lread
GlobalReAlloc
_hread
_lwrite
OpenFile
_lclose
GetModuleFileNameW
GetCommandLineW
GetVersionExW
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
lstrlenW
GetShortPathNameW
CloseHandle
OpenProcess
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalHandle
WideCharToMultiByte
LocalFree
GetCurrentThreadId
LocalAlloc
user32
IsWindow
DrawIcon
SendMessageW
IsIconic
LoadIconW
GetSystemMetrics
DestroyIcon
LoadCursorW
EnableWindow
GetParent
SetTimer
UpdateWindow
GetClientRect
GetWindowRect
LoadBitmapW
SystemParametersInfoW
gdi32
RealizePalette
GetDeviceCaps
CreateCompatibleDC
GetObjectW
CreatePalette
GetPaletteEntries
GetNearestPaletteIndex
GetStockObject
DeleteObject
SetDIBitsToDevice
StretchDIBits
BitBlt
SetStretchBltMode
advapi32
RegQueryValueExW
RegQueryValueW
RegSetValueW
RegCreateKeyW
RegSetValueExW
RegCloseKey
shell32
ExtractIconW
Sections
.text Size: 228KB - Virtual size: 225KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 600KB - Virtual size: 598KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ