Static task
static1
Behavioral task
behavioral1
Sample
2dd28d5d8ca28cdb66700ef5ed6ff790_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2dd28d5d8ca28cdb66700ef5ed6ff790_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
2dd28d5d8ca28cdb66700ef5ed6ff790_NeikiAnalytics.exe
-
Size
459KB
-
MD5
2dd28d5d8ca28cdb66700ef5ed6ff790
-
SHA1
7f8299297061c0442c422c4be85fa2e27fd1a7f1
-
SHA256
294f9ca92b8a03e11b802f914b92e26752992cdf7761b6bd9d89b3f4a70eedc0
-
SHA512
cb468e6d5bc266e99e73d54719a90de28a2dfbf3284f42a181db32f8852ea5125f82f978edd19ad35a6140664e5c46fe01e8979af9e774fa28befe2b0e4a7c5f
-
SSDEEP
6144:eVUv/CSLQbu0jUu5BwXRsAMJqkj37emhPcREXTIFQ7NS9rbtSQhKO7kzWM:0U/C1bdZXAlQEyXqkNS9rhzbkzWM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2dd28d5d8ca28cdb66700ef5ed6ff790_NeikiAnalytics.exe
Files
-
2dd28d5d8ca28cdb66700ef5ed6ff790_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
7b04ecdcc5019f6daaef5a5f35122b98
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetProcAddress
GetACP
VirtualAlloc
GetCurrentThread
GetOEMCP
GetStartupInfoA
ReleaseMutex
CreateFileMappingW
HeapFree
UnmapViewOfFile
CreateEventW
CreateThread
WaitForMultipleObjects
CreateMutexW
SetEvent
WaitForSingleObject
TerminateThread
GetExitCodeThread
GetExitCodeProcess
CloseHandle
CreateProcessW
Sleep
GetVersionExW
GetModuleHandleW
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
GetProcessHeap
HeapAlloc
OpenFileMappingW
OpenEventW
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
FreeLibrary
GetCommandLineW
GetSystemDirectoryW
LoadLibraryA
MapViewOfFile
lstrcpyW
GetLastError
LoadLibraryW
DeleteCriticalSection
LeaveCriticalSection
user32
LoadCursorA
LoadCursorW
GetWindowRect
LoadStringW
GetSysColorBrush
RegisterClassW
InvalidateRgn
DefWindowProcW
GetClientRect
BeginPaint
EndPaint
UnregisterClassW
GetDesktopWindow
GetWindowLongW
EnableWindow
DialogBoxParamW
IsWindow
GetParent
GetDlgItem
EndDialog
LoadIconW
SendDlgItemMessageW
MessageBoxW
PostMessageW
SetWindowLongW
SystemParametersInfoW
GetDC
ReleaseDC
SendMessageW
EnumWindows
GetSystemMetrics
SetForegroundWindow
GetWindowThreadProcessId
GetClassNameW
SetWindowPos
msvcrt
_controlfp
__dllonexit
_onexit
__p__fmode
__p__commode
fopen
_XcptFilter
_exit
_adjust_fdiv
_except_handler3
wcstok
swprintf
srand
_wcsnicmp
wcsncat
wcslen
wcsncpy
fclose
fflush
_vsnprintf
fputs
vfprintf
__setusermatherr
_initterm
__getmainargs
_acmdln
_cexit
_c_exit
exit
_wcsicmp
advapi32
RegOpenKeyA
Sections
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata51 Size: 238KB - Virtual size: 238KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ggg22 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata52 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ