Static task
static1
Behavioral task
behavioral1
Sample
45617a0991951f470a7f5e2637c4bb50_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
45617a0991951f470a7f5e2637c4bb50_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
45617a0991951f470a7f5e2637c4bb50_NeikiAnalytics.exe
-
Size
444KB
-
MD5
45617a0991951f470a7f5e2637c4bb50
-
SHA1
fb1731b3795e37d2a3190710bc4fc4c54a1c5bcb
-
SHA256
6ae28e83279e07c8a5bad0d2d31aef712e766baa969380f3332c8017f1798d53
-
SHA512
563f21b5ffc518e568dc242986374b76c15311282cc5159d9af2c3f392c086816a8e29e4665e5ed7666a97b2a19f7442de06eee56dab9799e3fa96b3c5b598ae
-
SSDEEP
1536:MJ5fN9MFSzlSCzW/SgFEPdkkq4/F54eRNH8LNf28m:xStsUhqY54er8V28m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 45617a0991951f470a7f5e2637c4bb50_NeikiAnalytics.exe
Files
-
45617a0991951f470a7f5e2637c4bb50_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
fc811fa04a3f9a5293e9b1858e717afa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
dbghelp
MiniDumpWriteDump
kernel32
LoadResource
FindResourceExW
FreeLibrary
GetProcAddress
LoadLibraryW
GetCurrentProcess
CloseHandle
GetCurrentThreadId
CreateFileW
GetCurrentProcessId
SetUnhandledExceptionFilter
FindClose
CompareFileTime
FindNextFileW
FindFirstFileExW
GetLastError
CreateMutexW
Sleep
GetExitCodeProcess
LockResource
FormatMessageW
CreateProcessW
GetTickCount
GetStdHandle
SearchPathW
GlobalMemoryStatus
SetCurrentDirectoryW
GetModuleFileNameW
GetModuleHandleW
HeapSize
GetDriveTypeA
GetLocaleInfoA
OutputDebugStringW
GetUserDefaultUILanguage
CreateFileA
LocalFree
TlsGetValue
GetStringTypeW
RtlUnwind
RaiseException
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
FindFirstFileW
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleA
FlushFileBuffers
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetFullPathNameW
GetCurrentDirectoryA
WideCharToMultiByte
ExitProcess
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
GetTimeZoneInformation
VirtualAlloc
HeapReAlloc
LCMapStringA
LCMapStringW
CompareStringA
CompareStringW
SetEnvironmentVariableA
LoadLibraryA
InitializeCriticalSection
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
user32
GetWindowTextW
EnumWindows
GetWindowThreadProcessId
IsWindowVisible
ShowWindow
SetForegroundWindow
MessageBoxW
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
GetUserNameW
shell32
FindExecutableW
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 364KB - Virtual size: 360KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ