rocGetDigInt
Static task
static1
Behavioral task
behavioral1
Sample
0b30935301b09a3ba493cae84bbd04a0_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0b30935301b09a3ba493cae84bbd04a0_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
0b30935301b09a3ba493cae84bbd04a0_NeikiAnalytics.exe
-
Size
463KB
-
MD5
0b30935301b09a3ba493cae84bbd04a0
-
SHA1
fd7625514c1dc87e81e3202a04ad384a674c777d
-
SHA256
d2f7c402aef55e24f882053292b0abbea69b0994fd59b700167ad14a352753d2
-
SHA512
d7ec2df5622f3ff5c8c498388b2821ade61a04599d933d6cb04b9b2d3edd223fd48e72a6aa068bcb71b6eeef07bd55b6d873026076dcad579d33ca7ead48ac1f
-
SSDEEP
6144:y5oAPbfvp/xK/MIwhwhmduLxvQ5jIkkQ/qaLLr:y5oWbfl8MIwhw/Vv4rkQ/1r
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b30935301b09a3ba493cae84bbd04a0_NeikiAnalytics.exe
Files
-
0b30935301b09a3ba493cae84bbd04a0_NeikiAnalytics.exe.dll windows:4 windows x86 arch:x86
15c6c659fb5fd30164a5d2e1a2c2f2e9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
advapi32
AdjustTokenPrivileges
GetUserNameA
LookupPrivilegeValueA
OpenProcessToken
iphlpapi
GetAdaptersInfo
kernel32
ClearCommError
CloseHandle
CreateEventA
CreateFileA
CreateMutexA
DeleteCriticalSection
EnterCriticalSection
EscapeCommFunction
FreeLibrary
GetCommConfig
GetCommModemStatus
GetCommState
GetCommTimeouts
GetComputerNameA
GetCurrentProcess
GetCurrentThreadId
GetEnvironmentVariableA
GetFileSize
GetLastError
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetSystemTime
GetVersionExA
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
MultiByteToWideChar
OpenEventA
OpenMutexA
PurgeComm
QueryPerformanceCounter
QueryPerformanceFrequency
ReadFile
ReleaseMutex
ResetEvent
SetCommConfig
SetCommState
SetCommTimeouts
SetEvent
SetThreadPriority
Sleep
TerminateThread
TlsGetValue
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
mpr
WNetGetConnectionA
msvcrt
__mb_cur_max
__setusermatherr
_amsg_exit
_beginthread
_chdir
_errno
_getcwd
_getpid
_initterm
_inp
_iob
_lock
_outp
_unlock
_utime
abort
acos
asin
atan
atof
atoi
atol
calloc
fclose
fflush
fopen
fputc
fputs
fread
free
fseek
ftell
fwrite
getenv
localeconv
malloc
memchr
memcmp
memcpy
memmove
memset
mktime
localtime
qsort
rand
realloc
remove
rename
setlocale
srand
strcat
strchr
strcmp
strcpy
strerror
strlen
strncat
strncmp
strncpy
strrchr
strstr
strtol
system
tan
tolower
toupper
vfprintf
time
_stricmp
_strnicmp
wcslen
_stat
_fstat
_rmdir
_mkdir
_fileno
_fdopen
_access
user32
ExitWindowsEx
winmm
timeBeginPeriod
timeEndPeriod
ws2_32
WSAGetLastError
WSAStartup
accept
bind
closesocket
connect
gethostbyname
gethostname
getpeername
getsockname
htonl
htons
inet_addr
inet_ntoa
ioctlsocket
listen
ntohs
recv
recvfrom
send
sendto
setsockopt
socket
Exports
Exports
Sections
.text Size: 280KB - Virtual size: 280KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 12KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 72B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ