Static task
static1
Behavioral task
behavioral1
Sample
0c83b721e78407d94d119ec328a6e120_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0c83b721e78407d94d119ec328a6e120_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
0c83b721e78407d94d119ec328a6e120_NeikiAnalytics.exe
-
Size
29KB
-
MD5
0c83b721e78407d94d119ec328a6e120
-
SHA1
d3c006d0049ec37ed3fface4dff86fe987c1183f
-
SHA256
a60fab9eee527749fab37c60b99ff251d6ce90c3f3e36e27fedfe821bc4a82e1
-
SHA512
65b5911ae3d328533006f5f4237204a0e477ea2b773bb4749958d43492db17253c87191559dc3ace6652dcfc7815eb15ea2018e65b644ff56f1c4c32208ce94c
-
SSDEEP
384:6gmi9aclTHApPFpPNyE40aFF666666666JJ7UueqrDjFvbusSFb2+hjc5QQm:RmIVAp7lyHeUueqkpFb/v
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c83b721e78407d94d119ec328a6e120_NeikiAnalytics.exe
Files
-
0c83b721e78407d94d119ec328a6e120_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
6a746de356fec43a4a9b63e328ee9516
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ReleaseDC
GetDC
RegisterClassExW
CreateWindowExW
GetMessageW
TranslateMessage
DispatchMessageW
SendMessageW
DefWindowProcW
PostQuitMessage
UpdateWindow
ShowWindow
DrawTextExW
kernel32
GetModuleHandleA
HeapAlloc
GetProcessHeap
GetStartupInfoA
CloseHandle
lstrlenW
HeapFree
CreateFileW
ReadFile
lstrcpyW
msvcrt
exit
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p__acmdln
_exit
_XcptFilter
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.htext Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE