Static task
static1
Behavioral task
behavioral1
Sample
2a488a90c203457aecf4ad316a703220_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2a488a90c203457aecf4ad316a703220_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
2a488a90c203457aecf4ad316a703220_NeikiAnalytics.exe
-
Size
37KB
-
MD5
2a488a90c203457aecf4ad316a703220
-
SHA1
c600f751fbcffe3db0c7a62b7da316e9e848350b
-
SHA256
ea04a2c6b205c608715116bdbb730b00466dae52b6575c2ae5f7a330e256bef1
-
SHA512
f9ecc3551e46861d260c530e58ddd0eb35a3ea3495be007e857d8108df061b28c8c8818965e68eb87680437d1b9544f568d5f621f621ca189e1fa65533587985
-
SSDEEP
384:H5+UTsRkgWHZcXnDYc+4Yxt/4j5X/HLcyGgl185nI87hGr:H5hgkgWGXDYc+Vxt/49jz8I8w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2a488a90c203457aecf4ad316a703220_NeikiAnalytics.exe
Files
-
2a488a90c203457aecf4ad316a703220_NeikiAnalytics.exe.exe windows:1 windows x86 arch:x86
f736665ac33b6775ed4c156ddf9c52af
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
WSACleanup
WSAStartup
closesocket
connect
gethostbyname
htons
inet_addr
recv
send
socket
kernel32
ExitProcess
FindFirstFileA
FindNextFileA
FreeLibrary
GetCommandLineA
GetCurrentProcess
GetFileSize
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetProcAddress
GetSystemDirectoryA
GetTickCount
GetWindowsDirectoryA
CopyFileA
IsBadReadPtr
LoadLibraryA
MapViewOfFile
OpenMutexA
OpenProcess
Process32First
Process32Next
CreateFileA
ReadFile
CreateFileMappingA
ReadProcessMemory
ReleaseMutex
RtlUnwind
RtlZeroMemory
SetCurrentDirectoryA
SetEndOfFile
SetFileAttributesA
SetFilePointer
SetThreadPriority
CreateMutexA
TerminateProcess
UnmapViewOfFile
VirtualProtect
WriteFile
CreateThread
CreateToolhelp32Snapshot
user32
LoadCursorA
SetTimer
KillTimer
RegisterClassA
GetMessageA
TranslateMessage
DispatchMessageA
CreateWindowExA
DefWindowProcA
advapi32
GetUserNameA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
crtdll
__GetMainArgs
_strcmpi
toupper
abort
exit
fclose
feof
fgets
fopen
fputc
fputs
fread
free
fseek
ftell
fwrite
malloc
memcmp
memcpy
memset
raise
rand
signal
srand
strcat
strchr
strcmp
strstr
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE