Static task
static1
Behavioral task
behavioral1
Sample
21cb91bcd4e974db20d57382167b3900_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
21cb91bcd4e974db20d57382167b3900_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
21cb91bcd4e974db20d57382167b3900_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
21cb91bcd4e974db20d57382167b3900
-
SHA1
db94cda2a7f551b89f4f7c2d9e1eff85a73b9f75
-
SHA256
678f27270392f495438d839c4943f7c018c126afbe342087e7ee65f048f3ab03
-
SHA512
271c80e484afd2fa1515253fb30110424046ee6b0cf83a34a7c2324a7ae5a5060614b5eedf465d4d045788c14ecca80231dbfb149137b49af77c55f243d86ee7
-
SSDEEP
24576:BC4Lw8exab85O091a24jMgbAtXJ7sE7MiTpap10G4JSMVDxl:vDe4g5Oka24jvUvsE7LTYpeG4JpDf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 21cb91bcd4e974db20d57382167b3900_NeikiAnalytics.exe
Files
-
21cb91bcd4e974db20d57382167b3900_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
8c61f5a8719cd7fa65798ecb6850cf52
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyA
RegCloseKey
user32
GetKeyboardType
DestroyWindow
MessageBoxA
TranslateMessage
ShowWindow
SetWindowTextA
SetWindowPlacement
SetTimer
SetFocus
SetDlgItemTextA
SendMessageA
SendDlgItemMessageA
PostMessageA
PeekMessageA
OemToCharA
MessageBoxA
LoadIconA
KillTimer
IsWindowVisible
IsWindow
IsDlgButtonChecked
GetWindowTextLengthA
GetWindowPlacement
GetDlgItemTextA
GetDlgItem
GetDialogBaseUnits
GetClassNameA
EnumChildWindows
EndDialog
EnableWindow
DispatchMessageA
DialogBoxParamA
DestroyWindow
CheckRadioButton
kernel32
GetACP
Sleep
VirtualFree
VirtualAlloc
GetCurrentThreadId
VirtualQuery
SetCurrentDirectoryA
GetStartupInfoA
GetLastError
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
lstrcmpiA
WriteFile
WinExec
SetFileTime
SetFilePointer
SetEnvironmentVariableA
ReadFile
MulDiv
LocalFileTimeToFileTime
GetVolumeInformationA
GetVersionExA
GetTickCount
GetTempFileNameA
GetShortPathNameA
GetModuleFileNameA
GetFullPathNameA
GetFileSize
GetFileAttributesA
GetDriveTypeA
GetCurrentDirectoryA
FreeLibrary
ExpandEnvironmentStringsA
DosDateTimeToFileTime
DeleteFileA
CreateFileA
CreateDirectoryA
CloseHandle
Beep
shell32
SHGetFileInfoA
ShellExecuteA
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
comctl32
InitCommonControls
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 1024B - Virtual size: 704B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 12KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ