Static task
static1
Behavioral task
behavioral1
Sample
0ce6564d0fd13457e78b03ba9c27b3b0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0ce6564d0fd13457e78b03ba9c27b3b0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
0ce6564d0fd13457e78b03ba9c27b3b0_NeikiAnalytics.exe
-
Size
26KB
-
MD5
0ce6564d0fd13457e78b03ba9c27b3b0
-
SHA1
42edd2d7a0e2924a4d929973ed60fe892f25bf98
-
SHA256
88dfbb02a2192df566f5eea99d48a0f76f200706473cca663a3a1bfdf82eca18
-
SHA512
98a24faa81b5c766ff1f0ca09f71773b7848176bd05a2fe7ae57d30231b74ff943f0611f958259d3b68f6c7e4fd36dda30015c3bc18579ce83f0a7b18d7665d7
-
SSDEEP
768:MWY+28/GMfE+53TKbGRz60+/qkV9VKblxQta/cVC5:vOw60+pHwXEa68
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ce6564d0fd13457e78b03ba9c27b3b0_NeikiAnalytics.exe
Files
-
0ce6564d0fd13457e78b03ba9c27b3b0_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
2f449bda0e6ebea2249bbf0389bc20b4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumePathNameA
GetStringTypeExA
EncodePointer
WriteProcessMemory
GetExitCodeThread
GetVolumePathNameA
FindFirstChangeNotificationA
TerminateProcess
SetThreadUILanguage
GetWindowsDirectoryW
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zrdata Size: 26KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE