Static task
static1
Behavioral task
behavioral1
Sample
ca1e57b2227544a746368b7a9fd944a0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca1e57b2227544a746368b7a9fd944a0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
ca1e57b2227544a746368b7a9fd944a0_NeikiAnalytics.exe
-
Size
778KB
-
MD5
ca1e57b2227544a746368b7a9fd944a0
-
SHA1
25c69c741710f9e7527852e053f19044f7649cd2
-
SHA256
07f8c36f5e6a555d7ec5a3e40324ad5ea847cd4a3982708822e74c9aa3fc0dfd
-
SHA512
aa9e424815f9a7edd114661ef8fe0375053f49f5743dc40e721a74563e4056784ea3d93869d35159fcc81014c2b0aafddec2ec2fbf86a30532637c1f7fdeb3be
-
SSDEEP
24576:juatKsqS9d1H7NoxvEHSJ5dThZ3v+67BbpM:wS9fyxvEHORD3vH7FO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ca1e57b2227544a746368b7a9fd944a0_NeikiAnalytics.exe
Files
-
ca1e57b2227544a746368b7a9fd944a0_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
2627a144954d261d757f031f285f7c9c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegDeleteValueA
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
RegCloseKey
FreeSid
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegOpenKeyA
RegQueryInfoKeyA
kernel32
lstrcatA
GetFileAttributesA
lstrlenA
lstrcmpiA
GetCurrentProcess
GetPrivateProfileStringA
GetPrivateProfileIntA
lstrcpyA
GetModuleFileNameA
RemoveDirectoryA
FindClose
FindNextFileA
DeleteFileA
SetFileAttributesA
lstrcmpA
FindFirstFileA
_lclose
_llseek
_lopen
GetWindowsDirectoryA
CreateDirectoryA
InterlockedDecrement
LocalAlloc
GetLastError
InterlockedIncrement
SetCurrentDirectoryA
CreateEventA
ResetEvent
CreateThread
GetVersionExA
FormatMessageA
FreeLibrary
GetProcAddress
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
LoadLibraryA
FreeResource
LockResource
LoadResource
FindResourceA
SizeofResource
CreateFileA
ReadFile
WriteFile
SetFilePointer
SetFileTime
SetEvent
TerminateThread
GlobalAlloc
GlobalFree
GetTempFileNameA
GetDriveTypeA
GetTempPathA
lstrcpynA
CloseHandle
GetDiskFreeSpaceA
GetCurrentDirectoryA
LoadLibraryExA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
LocalFree
TerminateProcess
RtlUnwind
UnhandledExceptionFilter
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetCPInfo
GetACP
GetOEMCP
SetHandleCount
GetFileType
GetStdHandle
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
HeapCreate
GetStringTypeA
GetStringTypeW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
LCMapStringA
LCMapStringW
HeapFree
HeapAlloc
SetStdHandle
GetLocaleInfoA
GetLocaleInfoW
FlushFileBuffers
GetVolumeInformationA
LocalFileTimeToFileTime
DosDateTimeToFileTime
ExitProcess
gdi32
GetDeviceCaps
user32
EnableWindow
LoadStringA
GetDesktopWindow
wsprintfA
ExitWindowsEx
CharPrevA
DialogBoxParamA
SetWindowLongA
GetWindowLongA
CallWindowProcA
GetDlgItem
SetForegroundWindow
SetWindowTextA
SendDlgItemMessageA
GetDlgItemTextA
SetDlgItemTextA
SendMessageA
PeekMessageA
DispatchMessageA
MsgWaitForMultipleObjects
SetWindowPos
ReleaseDC
GetDC
GetWindowRect
MessageBoxA
ShowWindow
CharNextA
MessageBeep
EndDialog
comctl32
ord17
Sections
.text Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SharedD Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 697KB - Virtual size: 700KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE