Static task
static1
Behavioral task
behavioral1
Sample
28c80c5c0ae1e1af87c17f6dc17f6420_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
28c80c5c0ae1e1af87c17f6dc17f6420_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
28c80c5c0ae1e1af87c17f6dc17f6420_NeikiAnalytics.exe
-
Size
108KB
-
MD5
28c80c5c0ae1e1af87c17f6dc17f6420
-
SHA1
28931978d8d5c5abf5eed8daf3b32d9e22901707
-
SHA256
86e5afe6495aafe894646f08a3c9c1e9f7728a25867ecae9abaf05c46dfdfc4c
-
SHA512
a4d3710781410c96286fc0dd2652f51d92e0b0b1c34ced56f229734bb3f1fcf32c045c6f7c13a6c20b31321c62ed3fbcac5adcae92a639a4aa90b1feda9c787f
-
SSDEEP
1536:59qZdHWep0GH7WiLcMxJPo7shTcq9MlWkFLNIEarKrMGK:59qNqWDLcMxJPoOgcMlW2hIZGrw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 28c80c5c0ae1e1af87c17f6dc17f6420_NeikiAnalytics.exe
Files
-
28c80c5c0ae1e1af87c17f6dc17f6420_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
d68f0fcb2ff6f24f55ed7472dde19ba6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
MoveFileExA
RemoveDirectoryA
MoveFileA
GetTempFileNameA
CopyFileA
CompareFileTime
GetFileTime
SetFileAttributesA
GetVersionExA
GetLastError
CreateMutexA
GetFileSize
GetModuleFileNameA
GetCommandLineA
GetCurrentProcess
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
GetShortPathNameA
VirtualAlloc
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapFree
HeapSize
TerminateProcess
HeapAlloc
HeapReAlloc
ExitProcess
GetVersion
GetStartupInfoA
GetCurrentDirectoryA
SetCurrentDirectoryA
MultiByteToWideChar
SetErrorMode
GetProcAddress
FreeLibrary
LCMapStringW
CreateProcessA
Sleep
GetExitCodeProcess
GetTempPathA
GetTickCount
GetFileAttributesA
WriteFile
CreateFileA
SetFilePointer
CloseHandle
ReadFile
GlobalReAlloc
GlobalUnlock
GlobalFree
GlobalAlloc
GlobalLock
DeleteFileA
lstrcpyA
lstrlenA
lstrcatA
GetModuleHandleA
LoadLibraryA
MulDiv
user32
SetDlgItemTextA
MessageBoxA
GetParent
DialogBoxParamA
GetWindowTextA
PostQuitMessage
GetDlgItem
GetDlgItemTextA
ReleaseDC
GetDC
GetDesktopWindow
LoadCursorA
ExitWindowsEx
EnableWindow
GetWindowRect
SystemParametersInfoA
ShowWindow
SetFocus
SendDlgItemMessageA
IsDialogMessageA
WaitMessage
MsgWaitForMultipleObjects
TranslateMessage
DispatchMessageA
PeekMessageA
GetMessageA
GetSystemMetrics
RegisterClassExA
SetWindowTextA
DefWindowProcA
ChildWindowFromPoint
GetWindowLongA
SetCursor
InvalidateRect
LoadIconA
LoadImageA
GetSysColor
CreateWindowExA
SetWindowLongA
SendMessageA
EndDialog
gdi32
CreateSolidBrush
GetDeviceCaps
GetStockObject
DeleteDC
StretchDIBits
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBitmap
CreateFontA
SetBkMode
SetBkColor
SetTextColor
CreatePalette
DeleteObject
advapi32
RegDeleteKeyA
RegOpenKeyExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegSetValueExA
RegQueryValueExA
RegDeleteValueA
RegEnumValueA
RegEnumKeyExA
RegCloseKey
shell32
ShellExecuteA
ole32
CoUninitialize
OleInitialize
OleUninitialize
CoInitialize
oleaut32
UnRegisterTypeLi
LoadTypeLi
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
comctl32
ord17
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ