rocGetDigInt
Static task
static1
Behavioral task
behavioral1
Sample
4c2d5dcd03633786de3b4de433ecd7a0_NeikiAnalytics.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4c2d5dcd03633786de3b4de433ecd7a0_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
General
-
Target
4c2d5dcd03633786de3b4de433ecd7a0_NeikiAnalytics.exe
-
Size
492KB
-
MD5
4c2d5dcd03633786de3b4de433ecd7a0
-
SHA1
7de1bd8575718c96386da1d883f2e73ba4c3a430
-
SHA256
8939411d4a87691288fc467582aece3c05dab51ca92ccc7de47a7f965aedd20e
-
SHA512
d44cec10bae06550077d21b1c9d487529fb3f01484b3d74129344d1a9238da77b1aae522c5b7a8a83c9b61f76aa5cd2f53296939d5d5e7526b90fba8e57782ed
-
SSDEEP
6144:M3L1/bu0QDEPXFGFKTLpIdkxaBbdXx/U+eZZRnoavu:M3L1tQDEPXFGFCLNWRh/2oavu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c2d5dcd03633786de3b4de433ecd7a0_NeikiAnalytics.exe
Files
-
4c2d5dcd03633786de3b4de433ecd7a0_NeikiAnalytics.exe.dll windows:4 windows x64 arch:x64
5277312ed7e2278fe66590912a2e2774
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
advapi32
AdjustTokenPrivileges
GetUserNameA
LookupPrivilegeValueA
OpenProcessToken
iphlpapi
GetAdaptersInfo
kernel32
ClearCommError
CloseHandle
CreateEventA
CreateFileA
CreateMutexA
DeleteCriticalSection
EnterCriticalSection
EscapeCommFunction
GetCommConfig
GetCommModemStatus
GetCommState
GetCommTimeouts
GetComputerNameA
GetCurrentProcess
GetCurrentThreadId
GetEnvironmentVariableA
GetFileSize
GetLastError
GetSystemTime
GetVersionExA
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
MultiByteToWideChar
OpenEventA
OpenMutexA
PurgeComm
QueryPerformanceCounter
QueryPerformanceFrequency
ReadFile
ReleaseMutex
ResetEvent
SetCommConfig
SetCommState
SetCommTimeouts
SetEvent
SetThreadPriority
Sleep
TerminateThread
TlsGetValue
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
mpr
WNetGetConnectionA
msvcrt
___lc_codepage_func
___mb_cur_max_func
__iob_func
__setusermatherr
_amsg_exit
_beginthread
_chdir
_errno
_fstat64
_getcwd
_getpid
_initterm
_localtime64
_lock
_mktime64
_stat64
_stricmp
_strnicmp
_time64
_unlock
_utime
abort
acos
asin
atan
atof
atoi
atol
calloc
fclose
fflush
fopen
fputc
fputs
fread
free
fseek
ftell
fwrite
getenv
localeconv
malloc
memchr
memcmp
memcpy
memmove
memset
qsort
realloc
remove
rename
srand
strcat
strchr
strcmp
strcpy
strerror
strlen
strncat
strncmp
strncpy
strrchr
strstr
strtol
system
tan
tolower
toupper
vfprintf
wcslen
_rmdir
_mkdir
_fileno
_fdopen
_access
user32
ExitWindowsEx
winmm
timeBeginPeriod
timeEndPeriod
ws2_32
WSAGetLastError
WSAStartup
accept
bind
closesocket
connect
gethostbyname
gethostname
getnameinfo
getpeername
getsockname
htonl
htons
inet_addr
inet_ntoa
ioctlsocket
listen
ntohs
recv
recvfrom
send
sendto
setsockopt
socket
Exports
Exports
Sections
.text Size: 330KB - Virtual size: 329KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 19KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ