Static task
static1
Behavioral task
behavioral1
Sample
75d667cbbb90250923a248ae4752fa40_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
75d667cbbb90250923a248ae4752fa40_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
75d667cbbb90250923a248ae4752fa40_NeikiAnalytics.exe
-
Size
161KB
-
MD5
75d667cbbb90250923a248ae4752fa40
-
SHA1
13146a1822d1737e301f0fb47d0235b635ba8808
-
SHA256
69f4e0e77247ad3683789538c592b116241fbd089de256cb23f7d85ebdfbd983
-
SHA512
32c78758e88b087152f61b52c006242391b3bc5ea20305d3d0784386ba2be80bcd123a536a47df0481364255f27d5ab557e49439f7cc276a1bd2bcaaab66cba0
-
SSDEEP
3072:6o1N75X7FstzthWKDL8wMEM96TDH6jEFO+FaASYvQd2a:6o15IzWqLuEM96/6jUOEv1a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 75d667cbbb90250923a248ae4752fa40_NeikiAnalytics.exe
Files
-
75d667cbbb90250923a248ae4752fa40_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
124156eff089996a18fc244c4620c9d2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTime
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentThread
FindNextFileW
GetDiskFreeSpaceExW
GetVolumeInformationW
GetLogicalDrives
GetTempFileNameW
LoadLibraryW
RtlUnwind
CreateProcessW
GetCurrentProcess
GetVolumeNameForVolumeMountPointA
GetWindowsDirectoryA
GetLocaleInfoA
GetModuleHandleA
FindClose
FindFirstFileW
MultiByteToWideChar
WideCharToMultiByte
VirtualProtect
GetProcAddress
WaitForSingleObject
CreateThread
CopyFileW
GetTempPathW
Sleep
GetUserDefaultUILanguage
GetUserDefaultLangID
GetSystemDefaultLangID
SetUnhandledExceptionFilter
SetErrorMode
MulDiv
GetVersionExA
ExitProcess
GetModuleFileNameW
FlushFileBuffers
SetFileTime
GetLastError
GetSystemTimeAsFileTime
SetFilePointer
ReadFile
SetFileAttributesW
GetFileAttributesExW
DeleteFileW
MoveFileExW
WriteFile
GetFileSizeEx
CreateFileW
CloseHandle
VirtualFree
VirtualAlloc
GetDriveTypeW
GetStringTypeW
LCMapStringW
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapCreate
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetModuleHandleW
IsProcessorFeaturePresent
RaiseException
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapAlloc
HeapFree
GetStdHandle
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
HeapSize
HeapReAlloc
user32
FrameRect
SystemParametersInfoW
DrawTextW
GetDC
GetSystemMetrics
ReleaseDC
FillRect
gdi32
SelectObject
GetDIBits
GetObjectA
SetBkMode
SetTextColor
CreateSolidBrush
CreateCompatibleBitmap
CreateFontA
DeleteObject
GetDeviceCaps
CreateCompatibleDC
DeleteDC
advapi32
CryptCreateHash
AccessCheck
MapGenericMask
DuplicateToken
OpenThreadToken
GetFileSecurityW
CryptHashData
SetTokenInformation
OpenProcessToken
CryptDestroyHash
CryptGetHashParam
RegSetValueExW
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
CryptEncrypt
CryptSetKeyParam
CryptImportKey
CryptDestroyKey
shell32
ShellExecuteW
SHGetFolderPathW
wininet
InternetConnectA
InternetSetOptionA
InternetOpenA
InternetCrackUrlA
InternetCloseHandle
HttpOpenRequestA
InternetQueryOptionA
HttpSendRequestExA
InternetWriteFile
HttpEndRequestA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
HttpAddRequestHeadersA
mpr
WNetEnumResourceW
WNetAddConnection2W
WNetCloseEnum
WNetOpenEnumW
netapi32
DsRoleFreeMemory
DsRoleGetPrimaryDomainInformation
urlmon
ObtainUserAgentString
Sections
.text Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ