Static task
static1
Behavioral task
behavioral1
Sample
7ed04c6d6d0a329ea93956ab12c40e50_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7ed04c6d6d0a329ea93956ab12c40e50_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
General
-
Target
7ed04c6d6d0a329ea93956ab12c40e50_NeikiAnalytics.exe
-
Size
441KB
-
MD5
7ed04c6d6d0a329ea93956ab12c40e50
-
SHA1
9e3c7d42421feec319525692c1cef326caaf4929
-
SHA256
257b7d125eb383adb304c3f81ab3b547932b457a67165756ed549f78a5a3b0d8
-
SHA512
8c7b2d2a4e68744e488fb608be82f7e2dd5ab334a76769ab2726c9dc629b3aaad77b94eba07a1fc466bc5132dd0da23f5b742c40a63382b0b9121302447f1e5f
-
SSDEEP
6144:AFByyUQQBOXLxqbn2mwR1Y4e2z+Wi5k+jE6cQ8ItT50PNJmuna:AF7U+VqbnB2zj+jE6iIF5QNQuna
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7ed04c6d6d0a329ea93956ab12c40e50_NeikiAnalytics.exe
Files
-
7ed04c6d6d0a329ea93956ab12c40e50_NeikiAnalytics.exe.dll windows:6 windows x86 arch:x86
9638da46a166d8cb867d5359ac75b2b1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
OutputDebugStringW
SetStdHandle
LoadLibraryExW
HeapReAlloc
SetFilePointerEx
ReadFile
GetConsoleMode
FlushFileBuffers
GetModuleFileNameW
WriteFile
GetOEMCP
GetACP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
HeapSize
AreFileApisANSI
WriteConsoleW
GetProcessHeap
GetFileType
GetStdHandle
IsDebuggerPresent
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetProcAddress
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TerminateProcess
GetCurrentProcess
Sleep
ReadConsoleW
GetModuleFileNameA
GetCommandLineA
HeapFree
GetConsoleCP
CloseHandle
ExitProcess
CreateThread
FreeLibrary
ExpandEnvironmentStringsW
EnumSystemLocalesW
TlsAlloc
FindNextFileW
CreateEventW
IsDBCSLeadByteEx
GetProcessTimes
SetCommState
GetTickCount
WaitForSingleObjectEx
SetEndOfFile
GetLocalTime
CreateNamedPipeA
FindFirstFileA
CreateProcessA
SetCommTimeouts
GetLocaleInfoA
CreatePipe
MultiByteToWideChar
CreateFileW
CreateEventA
SetCommBreak
GetModuleHandleExW
WideCharToMultiByte
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetStringTypeW
GetLastError
GetCurrentThreadId
GetCPInfo
RaiseException
RtlUnwind
HeapAlloc
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
user32
SetScrollPos
DestroyWindow
GetWindowTextA
EnableMenuItem
DialogBoxParamA
IsRectEmpty
CreateIconIndirect
UnionRect
ScrollWindowEx
TrackPopupMenu
SetCapture
GetScrollInfo
SystemParametersInfoW
SetClassLongA
ScrollWindow
SetMenu
AppendMenuA
SystemParametersInfoA
ValidateRect
CheckMenuItem
HideCaret
RemovePropA
GetWindowPlacement
OffsetRect
SetPropA
SetCaretPos
LoadCursorA
GetCaretBlinkTime
DeleteMenu
RegisterClassA
SetScrollRange
GetDC
ShowCursor
SetWindowLongA
MessageBoxA
UnregisterClassA
DestroyCursor
GetDesktopWindow
FlashWindow
SetWindowTextA
EndMenu
DestroyIcon
SetDlgItemTextA
gdi32
CreateCompatibleDC
SetMapMode
SetPolyFillMode
GetStockObject
GetCharacterPlacementW
GetTextExtentExPointA
MoveToEx
SetWindowExtEx
CreateFontA
CombineRgn
SelectPalette
CreateEnhMetaFileW
EndPage
DeleteDC
CreateHalftonePalette
SetPixel
GetTextExtentPointW
GetObjectW
SetWinMetaFileBits
CreateSolidBrush
PtInRegion
Ellipse
SetStretchBltMode
advapi32
RegDeleteValueA
CopySid
RegDeleteKeyA
EqualSid
RegOpenKeyExA
Sections
.text Size: 332KB - Virtual size: 332KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ