Static task
static1
Behavioral task
behavioral1
Sample
35db6f1aba2eec2362ccddee02be8340_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
35db6f1aba2eec2362ccddee02be8340_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
35db6f1aba2eec2362ccddee02be8340_NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
35db6f1aba2eec2362ccddee02be8340
-
SHA1
53aa0de4de61644747a3de17702b41403503e346
-
SHA256
a2811f75c1c9159244bc8cec5672b2fcdc0d5f11c210e634ca8864d32a4516da
-
SHA512
a63b0d9722d664da8420c0be61273c816645f88b522bded90c52b37a6d93002958735bba3fa53f7132c8e96037be311bda9a6590679c3ad0f868f65af5a5ed54
-
SSDEEP
24576:Nd5+j7o3mwNi5A+H+ngymuVBJKLWjwTeok6YJ7eATZCE:NnMnwNi5A+H6VHKLTaP7JIE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 35db6f1aba2eec2362ccddee02be8340_NeikiAnalytics.exe
Files
-
35db6f1aba2eec2362ccddee02be8340_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
7b2c4235a00e08021049cd62a817afc5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
lstrlenW
WideCharToMultiByte
MoveFileExW
GetTempFileNameW
GetTempPathW
DeleteFileW
MoveFileW
WriteFile
ReadFile
GetFileSize
CreateFileW
SetFileAttributesW
Sleep
GetModuleFileNameW
GetComputerNameA
GetSystemTime
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
HeapFree
GetCurrentThreadId
SetUnhandledExceptionFilter
ExitProcess
DecodePointer
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
EncodePointer
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
HeapReAlloc
HeapSize
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
MultiByteToWideChar
FreeLibrary
InterlockedExchange
GetStringTypeW
SetStdHandle
WriteConsoleW
SetEndOfFile
GetProcessHeap
CloseHandle
GetLastError
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcess
GetModuleHandleA
CreateProcessW
LoadLibraryW
SystemTimeToFileTime
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
LoadLibraryA
TlsGetValue
GetProcAddress
LocalAlloc
advapi32
CreateServiceW
RegSetValueExW
RegCreateKeyExW
OpenSCManagerW
OpenServiceW
QueryServiceConfigW
ChangeServiceConfigW
StartServiceW
CloseServiceHandle
RegCloseKey
RegOpenKeyExW
CryptAcquireContextW
CryptReleaseContext
GetUserNameW
GetUserNameA
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegQueryValueExW
ole32
CoCreateInstance
CoInitialize
shlwapi
PathAddExtensionW
PathAppendW
PathRemoveExtensionW
PathFileExistsW
PathIsRootW
Sections
.text Size: 384KB - Virtual size: 383KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.const Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 709KB - Virtual size: 730KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ