_Z8KeyEventijl@12
Static task
static1
Behavioral task
behavioral1
Sample
79cfeb7c158dc1641198cb7d55e9fbe0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
79cfeb7c158dc1641198cb7d55e9fbe0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
79cfeb7c158dc1641198cb7d55e9fbe0_NeikiAnalytics.exe
-
Size
68KB
-
MD5
79cfeb7c158dc1641198cb7d55e9fbe0
-
SHA1
c11eb53a6dca936e0ce7867605138f374d646b7e
-
SHA256
0987167acb4817c0590a7b20d043f71a71528fd5f807dafcefcee0e46988cece
-
SHA512
5c28615d0269ac468a3e41436fc66ac0adfa172dad2b6e5e2730205bb1316b7309bbb16a70309040fb7d3340ceb11b8c1c5a123dd917dee163bf8b4be1bad7b7
-
SSDEEP
384:zOUec83C3vKZ5LWV1A6zskiaIKl98kSAZBRyRJKVuRNU8aUpcjG+suv9hteUKuiR:zLehS3GEV70sBMKVOCN7jGWjCOJqp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 79cfeb7c158dc1641198cb7d55e9fbe0_NeikiAnalytics.exe
Files
-
79cfeb7c158dc1641198cb7d55e9fbe0_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
6a681d97178cb35136e4d8a64a39cce1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
GetUserNameA
RegCloseKey
RegCreateKeyA
RegOpenKeyExA
RegSetValueExA
kernel32
AddAtomA
CloseHandle
CopyFileA
CreateMutexA
CreateThread
DeleteFileA
ExitProcess
FindAtomA
FreeConsole
GetAtomNameA
GetComputerNameA
GetLastError
GetModuleFileNameA
GetModuleHandleA
OpenProcess
ReadProcessMemory
SetFileAttributesA
SetUnhandledExceptionFilter
Sleep
VirtualAllocEx
VirtualFreeEx
WaitForSingleObject
WriteProcessMemory
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
exit
fclose
fflush
fopen
fprintf
fputs
fread
free
fseek
ftell
malloc
memcpy
memset
printf
puts
rewind
signal
sprintf
strcat
strcmp
strcpy
strlen
strstr
toupper
shlwapi
PathFindFileNameA
user32
CallNextHookEx
DispatchMessageA
EnumChildWindows
FindWindowA
GetClassNameA
GetForegroundWindow
GetKeyNameTextA
GetMessageA
GetWindowTextA
GetWindowThreadProcessId
SendMessageA
SetWindowsHookExA
TranslateMessage
UnhookWindowsHookEx
wsock32
WSACleanup
WSAStartup
closesocket
connect
gethostbyname
htons
recv
send
socket
Exports
Exports
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 1008B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 79B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 792B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ