Behavioral task
behavioral1
Sample
2b63ae9a5a50b439577d8bc349f82810_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2b63ae9a5a50b439577d8bc349f82810_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
2b63ae9a5a50b439577d8bc349f82810_NeikiAnalytics.exe
-
Size
1.9MB
-
MD5
2b63ae9a5a50b439577d8bc349f82810
-
SHA1
9b0783d37cebef2b8dee25d57dad57f5878a1915
-
SHA256
724ac198599a3797a8f36369f9dfbfe7ba4a9ea28f0da9e2cef00232c28dec79
-
SHA512
d86f00619dd95d93b931432c7fc049a0830f1fcd93b0037dfcf7a8fb59bc5667d47c811f3416cf1508393d2c6089aca4c219b55ac6b178a19069e369199db798
-
SSDEEP
24576:gQbAOBW3fBXZWfdBN7tAvP06i4zJ+oRvM9nkuui5I3x2pgFTj61FMKmXX0X0ntHl:rTS5XCNBAU6t/in6x3xqgFTj6zEjWtd6
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2b63ae9a5a50b439577d8bc349f82810_NeikiAnalytics.exe
Files
-
2b63ae9a5a50b439577d8bc349f82810_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_NO_BIND
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gtcl Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kxvu Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.psfx Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.oncez Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bsp Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ