Behavioral task
behavioral1
Sample
778a7dd77c166dcc2624f9293e531bf0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
778a7dd77c166dcc2624f9293e531bf0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
778a7dd77c166dcc2624f9293e531bf0_NeikiAnalytics.exe
-
Size
1.9MB
-
MD5
778a7dd77c166dcc2624f9293e531bf0
-
SHA1
f5df1e2d25999d74bf143e4d101edfc7f072b080
-
SHA256
b012f1befb8f0b27e1769b2ae7249e92fc2b041b638367b99cdd481ae56c61e8
-
SHA512
745496d10f3bb2e03d22f6833a0e059f330cc67bedccb22d652254efdb85d9cf2805e0a8a47ae9fc3279601e596b925503519bccb8ae74dd1e89d4e494615ffc
-
SSDEEP
24576:wSVLjk0v9WbV6F45/+vgwRZsGNyNlyarXwe:wm3k0v9WbV6TZZiprXw
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule sample agile_net -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 778a7dd77c166dcc2624f9293e531bf0_NeikiAnalytics.exe
Files
-
778a7dd77c166dcc2624f9293e531bf0_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 285KB - Virtual size: 284KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ