Static task
static1
Behavioral task
behavioral1
Sample
4ab61de9b5ce55b7a03d291277b13160_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4ab61de9b5ce55b7a03d291277b13160_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
4ab61de9b5ce55b7a03d291277b13160_NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
4ab61de9b5ce55b7a03d291277b13160
-
SHA1
22c2d4a241bd6d82d72fa3267183c4e6edf3ed3a
-
SHA256
d859ffbf998c87818ab89e50df2f70b7ee7a34b258debacdbf4975dc8cf6f67a
-
SHA512
3daa577468ef38a7788e641962f6f036a139205ffac8aacf941c307b911ef39c9193cdc7427092a5d6895e444a1ebdbec3d9647b4d7f8c5eb52539f131cc6b0b
-
SSDEEP
24576:j4qAon7cHVVuLhTuQDZcxd4c984slTNlg:dEz+TjZcTpXslTvg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4ab61de9b5ce55b7a03d291277b13160_NeikiAnalytics.exe
Files
-
4ab61de9b5ce55b7a03d291277b13160_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
852988667a7b2c46b004730190fca256
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
DeleteCriticalSection
EnterCriticalSection
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetFileAttributesA
GetFullPathNameA
GetLastError
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
QueryPerformanceCounter
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
msvcrt
__dllonexit
__doserrno
__getmainargs
__initenv
__lconv_init
__pioinfo
__set_app_type
__setusermatherr
_access
_acmdln
_amsg_exit
_cexit
_errno
_exit
_filelengthi64
_fileno
_findclose
_findnext
_fmode
_fstati64
_fullpath
_initterm
_iob
_lock
_lseeki64
_onexit
_stati64
time
_stricmp
_strnicmp
_unlock
calloc
clock
exit
fclose
feof
ferror
fflush
fgetpos
fopen
fprintf
fputc
fputs
fread
free
fseek
fsetpos
ftell
fwrite
getc
getenv
malloc
memchr
memcmp
memcpy
memmove
memset
printf
putc
putchar
puts
qsort
realloc
rewind
setlocale
signal
sprintf
sscanf
strcat
strchr
strcmp
strcpy
strcspn
strerror
strlen
strncat
strncmp
strncpy
strpbrk
strrchr
strspn
strstr
strtol
strtoul
_vsnprintf
_write
abort
atoi
vfprintf
vprintf
_findfirst
_unlink
_umask
_strdup
_read
_open
_isatty
_getcwd
_fileno
_fdopen
_close
_chmod
user32
CharLowerBuffA
Sections
.text Size: 754KB - Virtual size: 754KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 308KB - Virtual size: 308KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 22KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 76KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE