Static task
static1
Behavioral task
behavioral1
Sample
6e4adc3c7d0b4c823eb5628dce593700_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6e4adc3c7d0b4c823eb5628dce593700_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
6e4adc3c7d0b4c823eb5628dce593700_NeikiAnalytics.exe
-
Size
203KB
-
MD5
6e4adc3c7d0b4c823eb5628dce593700
-
SHA1
4a4fdaaf49d5b8eb4ef29dbf452c7cca6733b707
-
SHA256
4fa0d92862a2313d670c58b1455d0b630b8fa8c0e44264283fb2e6ed3f186caa
-
SHA512
3ecb85b57618ba26ce1f4f5654cf9164fd9ec5b6cdcfc5c631c581c3b1a9d10e6ee25cab99a630befe01c9b58b3a1f4d5458a3f2f35fd35963847f759861e1e9
-
SSDEEP
6144:1EL1lvsWYuOiMnGNuuF8XcfI2MPO7qhnhF9mD:snksHxyXcfIRhFE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6e4adc3c7d0b4c823eb5628dce593700_NeikiAnalytics.exe
Files
-
6e4adc3c7d0b4c823eb5628dce593700_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
dec3dee9869bb0d71498fbbf0d597bb9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeResource
MoveFileW
GetLogicalDrives
WinExec
SearchPathW
GetACP
GetModuleHandleA
CreateDirectoryW
CompareStringA
GetEnvironmentStringsA
lstrcmpA
ExpandEnvironmentStringsA
SuspendThread
lstrcmpi
GetHandleInformation
lstrcatA
GetStringTypeW
CreateSemaphoreA
GetProcAddress
EnumTimeFormatsA
GetSystemDefaultLCID
GetNamedPipeInfo
GetCurrentThreadId
GetNumberFormatA
IsBadStringPtrA
GetModuleFileNameA
user32
DrawTextW
GetMessageW
OffsetRect
DialogBoxParamA
SendMessageW
CreateDialogIndirectParamW
LoadBitmapA
SetForegroundWindow
GetDlgItem
MonitorFromPoint
FindWindowW
WaitForInputIdle
CreateWindowExA
MoveWindow
SetWindowTextA
CharUpperA
GetDC
UpdateWindow
UnregisterClassA
GetKeyboardType
ShowWindow
GetClassInfoW
RegisterClassExW
CharNextA
CreateWindowExW
IsDlgButtonChecked
mouse_event
PostMessageA
RegisterClassExA
SetCursorPos
GetMenuItemInfoA
wvsprintfA
CharUpperW
GetCursorPos
GetSystemMetrics
CreateDialogParamA
GetIconInfo
ArrangeIconicWindows
DefWindowProcW
GetClassNameW
GetClassInfoExA
gdi32
BitBlt
GetTextMetricsW
CreateMetaFileW
GetEnhMetaFileA
CreateMetaFileA
EnumFontFamiliesExA
ResizePalette
FlattenPath
CreateFontIndirectW
OffsetClipRgn
GetCharABCWidthsI
SetMapperFlags
RestoreDC
TranslateCharsetInfo
SetBrushOrgEx
GetEnhMetaFileDescriptionA
PtInRegion
advapi32
RegQueryValueW
RegSaveKeyW
RegOpenKeyW
RegRestoreKeyW
RegFlushKey
RegEnumValueA
RegOpenKeyExA
RegCreateKeyExA
RegEnumValueW
RegCreateKeyExW
shlwapi
PathParseIconLocationW
UrlGetLocationW
PathFileExistsW
AssocQueryStringA
UrlCreateFromPathW
PathUndecorateA
StrCmpNIA
PathIsFileSpecW
Sections
.qtJ Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tc Size: 3KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.VXtI Size: 3KB - Virtual size: 205KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.B Size: 4KB - Virtual size: 235KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 103KB - Virtual size: 418KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.M Size: 4KB - Virtual size: 479KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 824B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ