rocGetDigInt
Static task
static1
Behavioral task
behavioral1
Sample
3b81b36beba3cc81375a260c83dc80b0_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3b81b36beba3cc81375a260c83dc80b0_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
3b81b36beba3cc81375a260c83dc80b0_NeikiAnalytics.exe
-
Size
316KB
-
MD5
3b81b36beba3cc81375a260c83dc80b0
-
SHA1
b13b2bbfdd950b26bb0e9970cdd1bfcafb001a5a
-
SHA256
9e1525dd2b3e5263b7b38a325bd6022dc8606d125724d820bfe3d475719080d8
-
SHA512
7e35b0674edbf5e02f7704a3cfdb3486a110e5ce01410504147ce44a4c6e59651f87ddea0a821b5a546426e573df5a746ccf20374267135b1b865ac5a36daf05
-
SSDEEP
3072:0rFzIXutvLVSCMdLJnIdv1mnr6zb8DYqfB3Yug/PLJkyyKGwhwC5BPjM6Pc6bnuE:GFQfBS4whwC5BPLRb577FQM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b81b36beba3cc81375a260c83dc80b0_NeikiAnalytics.exe
Files
-
3b81b36beba3cc81375a260c83dc80b0_NeikiAnalytics.exe.dll windows:4 windows x86 arch:x86
d39052431c78587aa4db7db7cafa3a4e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
advapi32
AdjustTokenPrivileges
GetUserNameA
LookupPrivilegeValueA
OpenProcessToken
iphlpapi
GetAdaptersInfo
kernel32
CloseHandle
CreateEventA
CreateFileA
CreateMutexA
DeleteCriticalSection
EnterCriticalSection
FreeLibrary
GetComputerNameA
GetCurrentProcess
GetCurrentThreadId
GetEnvironmentVariableA
GetFileSize
GetLastError
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetSystemTime
GetVersionExA
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
MultiByteToWideChar
OpenEventA
OpenMutexA
QueryPerformanceCounter
QueryPerformanceFrequency
ReadFile
ReleaseMutex
ResetEvent
SetEvent
SetThreadPriority
Sleep
TerminateThread
TlsGetValue
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
mpr
WNetGetConnectionA
msvcrt
__mb_cur_max
__setusermatherr
_amsg_exit
_beginthread
_chdir
_errno
_getcwd
_getpid
_initterm
_inp
_iob
_lock
_outp
_unlock
_utime
abort
acos
asin
atan
atof
atoi
atol
calloc
fclose
fflush
fopen
fputc
fputs
fread
free
fseek
ftell
fwrite
getenv
localeconv
malloc
memchr
memcmp
memcpy
memmove
memset
mktime
localtime
qsort
realloc
remove
rename
setlocale
srand
strcat
strchr
strcmp
strcpy
strerror
strlen
strncmp
strncpy
strrchr
strstr
strtol
system
tan
tolower
toupper
vfprintf
time
_stricmp
_strnicmp
wcslen
_stat
_fstat
_rmdir
_mkdir
_fileno
_fdopen
_access
user32
ExitWindowsEx
ws2_32
WSAGetLastError
WSAStartup
accept
bind
closesocket
connect
gethostbyname
gethostname
getpeername
getsockname
htonl
htons
inet_addr
inet_ntoa
ioctlsocket
listen
ntohs
recv
recvfrom
send
sendto
setsockopt
socket
Exports
Exports
Sections
.text Size: 194KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 11KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 76B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ