Static task
static1
Behavioral task
behavioral1
Sample
7d389b20dd19131458d97db99f36b020_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7d389b20dd19131458d97db99f36b020_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
7d389b20dd19131458d97db99f36b020_NeikiAnalytics.exe
-
Size
886KB
-
MD5
7d389b20dd19131458d97db99f36b020
-
SHA1
e1c612b29a9652577a0822576abc3a08e8b43a3f
-
SHA256
efec1e231883f5b5902c269015e9b3fbf57f06c2657dcdc090fadd9dd5102e38
-
SHA512
e75100baaa2077ab80b853a079f9a6d3d8362c9fd5a4fb0decf39a2e996b5ec4fffc4c83ce5fd710b23d45959984996f25eb0dd6cd922b592d98e0d804b1ed09
-
SSDEEP
12288:uLgxE8XoBA+p7EdP+b8Gro9XdKn6PXi/inLLIBa8hAT6QLqher8mn22:uLgS7T6TTLqhW1b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7d389b20dd19131458d97db99f36b020_NeikiAnalytics.exe
Files
-
7d389b20dd19131458d97db99f36b020_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
a2eb5786240b86838473ddc2f7786806
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControls
comdlg32
GetOpenFileNameA
GetSaveFileNameA
kernel32
AddAtomA
CloseHandle
CreateEventA
CreateFileA
CreateSemaphoreA
CreateThread
ExitProcess
FindAtomA
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetAtomNameA
GetCommState
GetCommTimeouts
GetCommandLineA
GetCurrentThread
GetLastError
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
PurgeComm
ReadFile
ReleaseSemaphore
ResetEvent
ResumeThread
SetCommState
SetCommTimeouts
SetEvent
SetLastError
SetUnhandledExceptionFilter
Sleep
SuspendThread
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
WriteFile
msvcrt
_stricmp
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
fflush
fprintf
free
malloc
memmove
memset
signal
strcat
strcmp
strlen
strtok
user32
CreateWindowExA
DefFrameProcA
DefMDIChildProcA
DestroyWindow
DispatchMessageA
EnableWindow
GetClientRect
GetMenu
GetMessageA
GetSubMenu
GetWindow
GetWindowLongA
GetWindowRect
LoadCursorA
LoadIconA
MessageBoxA
MoveWindow
PostMessageA
PostQuitMessage
RegisterClassExA
ScreenToClient
SendDlgItemMessageA
SendMessageA
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
TranslateMDISysAccel
TranslateMessage
UpdateWindow
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 48KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 268B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.stab Size: 91KB - Virtual size: 91KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.stabstr Size: 701KB - Virtual size: 701KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ