Static task
static1
Behavioral task
behavioral1
Sample
82a32bf90e3b0fa42f8ec72e0d515560_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
82a32bf90e3b0fa42f8ec72e0d515560_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
82a32bf90e3b0fa42f8ec72e0d515560_NeikiAnalytics.exe
-
Size
5.3MB
-
MD5
82a32bf90e3b0fa42f8ec72e0d515560
-
SHA1
d34e0ecc4bc6257c57b2f9d06b6a069e2f1439c2
-
SHA256
cee996f74239f2fe9d2615c184ed6da550a35fc18a4332710ee34f089d843a15
-
SHA512
790b57afe1669a77f6f4d813eae878daf888f18f683894bb26283e02da65143093639862631bc00605053a5a7886465c51962a2ae5d02d1cbfc00960b3dbbfa4
-
SSDEEP
98304:c311zbblHVcc04oOWxuVud8Z+feXsFM5s0Bgbyc3SmoDLx:c311zHPccTVWxuJ4fm8M5BBaSmCx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 82a32bf90e3b0fa42f8ec72e0d515560_NeikiAnalytics.exe
Files
-
82a32bf90e3b0fa42f8ec72e0d515560_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
1a01e21003ffa1f629940ee18dacbae7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMutexW
CreateNamedPipeW
CreatePipe
CreateProcessW
CreateThread
DeleteCriticalSection
DeleteFileW
DisconnectNamedPipe
DuplicateHandle
ExitProcess
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileW
FindNextFileW
FindResourceW
FlushFileBuffers
FormatMessageW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
FreeResource
GetACP
GetCommandLineW
GetComputerNameW
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCPInfo
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDiskFreeSpaceExW
GetDriveTypeW
GetEnvironmentStringsW
GetEnvironmentVariableA
GetEnvironmentVariableW
GetExitCodeProcess
GetFileAttributesA
GetFileAttributesW
GetFileTime
GetFileType
GetLastError
GetLocaleInfoA
GetLocaleInfoW
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetOverlappedResult
GetPrivateProfileIntW
GetPrivateProfileSectionNamesW
GetPrivateProfileStringW
GetProcAddress
GetProcessHeap
GetShortPathNameW
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetTempPathW
GetThreadContext
GetThreadPriority
GetTimeZoneInformation
GetVersionExA
GetVersionExW
GlobalAlloc
GlobalFree
GlobalHandle
CreateFileW
GlobalSize
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InterlockedDecrement
InterlockedExchangeAdd
InterlockedIncrement
IsValidCodePage
LCMapStringA
LCMapStringW
LoadLibraryExW
LoadLibraryW
LoadResource
LocalAlloc
LocalFree
LockResource
lstrcpyW
lstrlenA
MapViewOfFile
MoveFileExW
MulDiv
MultiByteToWideChar
OpenFileMappingW
OpenProcess
PeekNamedPipe
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadFile
ReadProcessMemory
ReleaseMutex
RemoveDirectoryW
ResetEvent
ResumeThread
SetCurrentDirectoryW
SetEndOfFile
SetEnvironmentVariableA
SetEnvironmentVariableW
SetEvent
SetFileAttributesW
SetFilePointer
SetHandleCount
SetLastError
SetStdHandle
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
SuspendThread
SystemTimeToTzSpecificLocalTime
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WaitNamedPipeW
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CreateFileMappingW
CreateFileA
CreateEventW
CreateDirectoryW
CopyFileW
ConnectNamedPipe
GetStartupInfoW
GetCommandLineA
InitializeCriticalSection
EnterCriticalSection
GetTickCount
LeaveCriticalSection
LoadLibraryA
GetThreadLocale
GlobalLock
GetStringTypeExW
user32
FillRect
FindWindowExW
FindWindowW
FrameRect
GetActiveWindow
GetAsyncKeyState
GetCapture
GetClassInfoW
GetClassNameA
GetClassNameW
GetClientRect
GetClipboardData
GetCursor
GetDC
GetDesktopWindow
GetDialogBaseUnits
GetDlgCtrlID
GetDlgItemInt
GetDlgItemTextW
GetFocus
GetForegroundWindow
GetIconInfo
GetKeyboardState
GetKeyNameTextW
GetKeyState
GetMenuItemCount
GetMenuItemInfoW
GetMessageExtraInfo
GetMessageW
GetNextDlgGroupItem
GetParent
GetPriorityClipboardFormat
GetPropW
GetScrollInfo
GetSubMenu
GetSysColorBrush
GetSystemMetrics
GetUpdateRect
GetWindowDC
GetWindowLongW
GetWindowPlacement
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
GetWindowThreadProcessId
InflateRect
InsertMenuItemW
InsertMenuW
InvalidateRect
InvalidateRgn
IsCharAlphaW
IsClipboardFormatAvailable
IsDialogMessageW
IsDlgButtonChecked
IsIconic
IsWindow
IsWindowEnabled
IsWindowVisible
IsZoomed
keybd_event
KillTimer
LoadCursorW
LoadIconW
LoadImageW
LoadStringW
MapDialogRect
MapVirtualKeyW
MapWindowPoints
EqualRect
ModifyMenuW
MoveWindow
MsgWaitForMultipleObjectsEx
OffsetRect
OpenClipboard
PeekMessageW
PostMessageW
PostQuitMessage
PtInRect
RedrawWindow
RegisterClassW
RegisterClipboardFormatW
ReleaseCapture
ReleaseDC
RemoveMenu
RemovePropW
ScreenToClient
ScrollWindowEx
SendDlgItemMessageW
SendMessageW
SetActiveWindow
SetCapture
SetClassLongW
SetClipboardData
SetCursor
SetDlgItemTextW
SetFocus
SetForegroundWindow
SetMenuDefaultItem
SetMenuItemBitmaps
SetMenuItemInfoW
SetPropW
SetScrollInfo
SetTimer
SetWindowLongW
SetWindowPlacement
SetWindowPos
SetWindowsHookExW
SetWindowTextW
ShowScrollBar
ShowWindow
SystemParametersInfoW
TrackPopupMenu
TranslateMessage
UnhookWindowsHookEx
UpdateWindow
ValidateRect
VkKeyScanW
WaitForInputIdle
WindowFromDC
WindowFromPoint
wsprintfW
EnableMenuItem
EmptyClipboard
DrawTextW
DrawTextExW
DrawStateW
DrawIconEx
DrawFocusRect
DrawEdge
DispatchMessageW
DialogBoxParamW
DialogBoxIndirectParamW
DestroyWindow
DestroyMenu
DestroyIcon
DeleteMenu
DefWindowProcW
EnumWindows
EnumThreadWindows
EnumDisplaySettingsW
EnumChildWindows
EndDialog
MessageBoxW
EnableWindow
CreateWindowExW
CreatePopupMenu
CreateIconIndirect
CreateDialogParamW
CreateDialogIndirectParamW
CountClipboardFormats
CopyImage
CloseClipboard
ClientToScreen
ChildWindowFromPoint
CheckMenuItem
CheckDlgButton
CharLowerW
CallWindowProcW
CallNextHookEx
DestroyCursor
advapi32
ReadEventLogA
RegSetValueExW
RegSetKeySecurity
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyW
RegOpenKeyExW
RegEnumValueW
RegEnumKeyW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
ReadEventLogW
shell32
SHEmptyRecycleBinW
shlwapi
PathCompactPathExW
PathRelativePathToW
SHDeleteEmptyKeyW
SHDeleteKeyW
msvcrt
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_except_handler3
Sections
.text Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_libc_1 Size: 799KB - Virtual size: 800KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE