Behavioral task
behavioral1
Sample
93190f7f739937ff6b61041f69e3c680_NeikiAnalytics.dll
Resource
win7-20240215-en
General
-
Target
93190f7f739937ff6b61041f69e3c680_NeikiAnalytics.exe
-
Size
39KB
-
MD5
93190f7f739937ff6b61041f69e3c680
-
SHA1
24b716246e5ff40d769e0017ffd4f4878e96e7c8
-
SHA256
6b2de25a7b639d59cfd168474218d5b71256e02fe8557a525d18c1a15e42adbc
-
SHA512
65a10cac977fef53aede47469163b38a3c647513287627a3c044fcf8cc564bb5b35dc274577e900d25326b5259813f6d1386bc9ea78b9b1fb632c032cb2a30d8
-
SSDEEP
768:Bs+RgMsmiIDftyPP+1H17jIydwYrlRm5TrTJyCO6zsMm5nnv1+Vn:WkiIDftyEhzm5TrTQ/FdZnvAl
Malware Config
Signatures
-
Ramnit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 93190f7f739937ff6b61041f69e3c680_NeikiAnalytics.exe
Files
-
93190f7f739937ff6b61041f69e3c680_NeikiAnalytics.exe.dll .vbs windows:4 windows x86 arch:x86 polyglot
397cedd2633ee4eb7fdf924f5cf9e2b0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FindFirstFileA
FindNextFileA
GetCurrentProcess
GetDiskFreeSpaceExA
GetDriveTypeA
GetFileSize
GetLastError
GetLocaleInfoA
GetLogicalDriveStringsA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersionExA
GetVolumeInformationA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalReAlloc
HeapAlloc
FindClose
HeapDestroy
HeapFree
HeapReAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
MapViewOfFile
MultiByteToWideChar
ReadFile
ReleaseMutex
SetEndOfFile
SetErrorMode
SetFileAttributesA
SetFilePointer
SetThreadPriority
Sleep
TryEnterCriticalSection
UnmapViewOfFile
WriteFile
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
ExpandEnvironmentStringsA
EnterCriticalSection
DeleteFileA
DeleteCriticalSection
CreateThread
CreateProcessA
CreateMutexA
CreateFileMappingA
CreateFileA
CreateDirectoryA
HeapCreate
CloseHandle
ws2_32
select
recv
socket
send
listen
ioctlsocket
getsockname
getpeername
gethostbyname
connect
closesocket
bind
accept
__WSAFDIsSet
WSAStartup
WSAGetLastError
WSACleanup
htons
inet_addr
user32
ExitWindowsEx
wsprintfA
MessageBoxA
advapi32
AdjustTokenPrivileges
OpenProcessToken
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegSetValueExA
LookupPrivilegeValueA
shell32
ShellExecuteA
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ