Static task
static1
Behavioral task
behavioral1
Sample
7b25e48475142ef5e150beb51dba4bb0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7b25e48475142ef5e150beb51dba4bb0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
7b25e48475142ef5e150beb51dba4bb0_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
7b25e48475142ef5e150beb51dba4bb0
-
SHA1
54b2347189a6c7c915197f3d1f4590daa4ee6052
-
SHA256
267f7ace9a20839f170777ac00fd891f09ec0887355b19e06208183a5fdd54fc
-
SHA512
af305f233b15ec239b84fb12b46f12a5728784d531ab4f269e52c77de7df0e581760b785f6d0b31b65fb41173e1c8f0dffbd7c8d08ec5cfed8bb064215185298
-
SSDEEP
24576:bLxcdeCYIVvT4A20Txy2rv1+n8IfexULGd+B+kXRyqGOMXmiA/EZn2bhTT3pP7u:/xpQrY0Fpi8IfexULGd+BjG1mBMZn2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7b25e48475142ef5e150beb51dba4bb0_NeikiAnalytics.exe
Files
-
7b25e48475142ef5e150beb51dba4bb0_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
a8e978afbcf4b0b316d145d0e34936c3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
FreeLibrary
GetCurrentThreadId
SystemTimeToFileTime
GetSystemTime
ReleaseMutex
DeleteFileA
CreateMutexA
GetTempPathA
SetEvent
GetCurrentProcessId
WaitForMultipleObjects
LoadLibraryA
LoadLibraryW
CreateDirectoryA
CreateDirectoryW
DeleteFileW
GetModuleFileNameA
GetModuleFileNameW
GetCurrentDirectoryA
GetCurrentDirectoryW
GetPrivateProfileIntA
GetPrivateProfileIntW
GetPrivateProfileStringA
GetPrivateProfileStringW
WritePrivateProfileStringA
WritePrivateProfileStringW
GetPrivateProfileStructA
GetPrivateProfileStructW
WritePrivateProfileStructA
WritePrivateProfileStructW
CreateProcessA
CreateProcessW
CreateThread
GetStdHandle
AllocConsole
GetLogicalDrives
GetLongPathNameA
LocalFree
QueryPerformanceFrequency
CompareStringW
CompareStringA
GetFullPathNameA
SetEndOfFile
GetOEMCP
GetStringTypeW
GetStringTypeA
FlushFileBuffers
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetCPInfo
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
GetFullPathNameW
RaiseException
SetHandleCount
HeapSize
UnhandledExceptionFilter
TerminateProcess
TlsGetValue
SetLastError
TlsAlloc
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
ExitProcess
GetCommandLineA
GetStartupInfoA
GetFileType
SetStdHandle
SetConsoleCtrlHandler
GetDriveTypeW
FileTimeToLocalFileTime
FileTimeToSystemTime
RtlUnwind
HeapReAlloc
ExitThread
TlsSetValue
GetLocalTime
GetTimeZoneInformation
HeapFree
HeapAlloc
GetACP
VirtualFree
VirtualAlloc
QueryPerformanceCounter
FindFirstFileW
FindFirstFileA
GetVersion
FindNextFileA
FindNextFileW
FindClose
GetModuleHandleA
WideCharToMultiByte
GetProcAddress
GetDriveTypeA
SetFilePointer
WriteFile
GetOverlappedResult
ResetEvent
GetTickCount
OutputDebugStringA
MultiByteToWideChar
CreateFileW
GetLastError
CreateFileA
GetFileSize
ReadFile
CreateFileMappingA
MapViewOfFile
CreateEventA
UnmapViewOfFile
IsBadWritePtr
InterlockedIncrement
InterlockedDecrement
Sleep
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
WaitForSingleObject
SetEnvironmentVariableA
CloseHandle
user32
SetWindowLongA
GetWindowLongA
GetClientRect
InsertMenuItemW
InsertMenuW
InsertMenuA
MessageBoxW
MessageBoxA
DefWindowProcW
GetWindowThreadProcessId
SetWindowTextW
CallWindowProcW
wsprintfA
GetWindowTextLengthA
PtInRect
RegisterClassExA
LoadImageA
GetClassInfoExA
InsertMenuItemA
SetTimer
ShowWindow
CheckDlgButton
IsDlgButtonChecked
TrackPopupMenu
SetWindowTextA
GetClassWord
FindWindowExA
SendDlgItemMessageA
EnumChildWindows
ScreenToClient
GetWindowRect
SendMessageA
GetDlgItem
PostMessageA
GetParent
IsChild
DestroyWindow
SetWindowPos
CreateDialogParamA
UpdateWindow
EndDialog
DialogBoxParamA
InvalidateRect
DefWindowProcA
EndPaint
DrawTextA
FillRect
BeginPaint
EnableWindow
DestroyMenu
CheckMenuItem
CreatePopupMenu
ReleaseCapture
SetCapture
SetFocus
GetWindowTextLengthW
GetWindowTextW
GetWindowTextA
DrawTextW
BeginDeferWindowPos
DeferWindowPos
EndDeferWindowPos
InvalidateRgn
SetParent
CreateWindowExA
PeekMessageA
TranslateMessage
DispatchMessageA
ClientToScreen
GetAsyncKeyState
MapVirtualKeyA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetWindow
IsWindowVisible
GetDesktopWindow
LoadCursorA
RegisterClassA
GetSysColor
KillTimer
GetCapture
GetWindowLongW
gdi32
CombineRgn
CreateRectRgnIndirect
RectInRegion
CreateDIBSection
DeleteObject
GetObjectA
SelectClipRgn
IntersectClipRect
GetClipRgn
CreateRectRgn
DPtoLP
BitBlt
SetTextColor
LineTo
MoveToEx
CreatePen
SetBkMode
CreateSolidBrush
SelectObject
RoundRect
GetTextColor
CreateCompatibleBitmap
GetTextMetricsA
CreateBitmap
CreateFontIndirectA
CreateCompatibleDC
DeleteDC
SetBkColor
SetMapMode
GetMapMode
advapi32
RegOpenKeyExA
RegQueryValueExW
RegCloseKey
RegEnumKeyA
RegOpenKeyA
RegQueryValueA
shell32
ShellExecuteW
SHGetSpecialFolderPathW
SHGetSpecialFolderPathA
ShellExecuteA
ole32
CoInitialize
CoGetMalloc
IIDFromString
StringFromCLSID
CoFreeUnusedLibraries
CoTaskMemAlloc
CoCreateInstance
CoTaskMemFree
CLSIDFromString
CoUninitialize
CreateStreamOnHGlobal
oleaut32
VariantClear
VariantInit
winmm
timeGetTime
wsock32
sendto
ntohs
inet_addr
WSACleanup
WSAStartup
accept
setsockopt
listen
getsockname
connect
WSAGetLastError
recvfrom
__WSAFDIsSet
send
recv
shutdown
closesocket
socket
bind
htons
inet_ntoa
ioctlsocket
gethostbyname
gethostbyaddr
htonl
select
comctl32
ord17
Sections
.text Size: 871KB - Virtual size: 871KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text1 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 42KB - Virtual size: 485KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 280KB - Virtual size: 279KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ