xbpbxnxouib8mt
Static task
static1
Behavioral task
behavioral1
Sample
57d549c0a2e4cddce5ca01b3b84a7f20_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
57d549c0a2e4cddce5ca01b3b84a7f20_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
General
-
Target
57d549c0a2e4cddce5ca01b3b84a7f20_NeikiAnalytics.exe
-
Size
540KB
-
MD5
57d549c0a2e4cddce5ca01b3b84a7f20
-
SHA1
207f6c5d0ad9a7f4198f486489686f71582a7d36
-
SHA256
67889da81743c39f1ff5069854cabba42992ab58a9d24dd95cdc0f0d5b3cd12a
-
SHA512
0be4a89f3fd6e17b90a5a0c69a77550d8533fde641aeb432bf69bf30b6fdc87adbbd1505b6607bbecb329fa5551c280198ecb41c8d83946f13460e5d415944fb
-
SSDEEP
6144:ti05kH9OyU2uv5SRf/FWgFgtbgqIRAUW9kVYeVprU4wfhTv5xD2ZP0GVGdXcukT4:YrHGPv5SmptsDmUWuVZkxikdXcq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 57d549c0a2e4cddce5ca01b3b84a7f20_NeikiAnalytics.exe
Files
-
57d549c0a2e4cddce5ca01b3b84a7f20_NeikiAnalytics.exe.dll windows:4 windows x64 arch:x64
9a873558f9739b47d573400f9a0176b2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
mprapi
MprAdminInterfaceTransportAdd
user32
GetDoubleClickTime
kernel32
GetBinaryTypeW
SetLastError
GetCurrentThreadId
MulDiv
ExitProcess
EnumResourceTypesA
GetModuleHandleA
GetModuleFileNameW
CreateDirectoryA
GetLastError
crypt32
CryptFreeOIDFunctionAddress
winmm
midiInReset
Exports
Exports
CredPackAuthenticationBufferA
CredPackAuthenticationBufferW
CredUICmdLinePromptForCredentialsA
CredUICmdLinePromptForCredentialsW
CredUIConfirmCredentialsA
CredUIConfirmCredentialsW
CredUIInitControls
CredUIParseUserNameA
CredUIParseUserNameW
CredUIPromptForCredentialsA
CredUIPromptForCredentialsW
CredUIPromptForWindowsCredentialsA
CredUIPromptForWindowsCredentialsW
CredUIPromptForWindowsCredentialsWorker
CredUIReadSSOCredA
CredUIReadSSOCredW
CredUIStoreSSOCredA
CredUIStoreSSOCredW
CredUnPackAuthenticationBufferA
CredUnPackAuthenticationBufferW
SspiGetCredUIContext
SspiIsPromptingNeeded
SspiPromptForCredentialsA
SspiPromptForCredentialsW
SspiUnmarshalCredUIContext
SspiUpdateCredentials
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.code Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sbss Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.crt Size: 160KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 996B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.xlhmxa Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rbpzuj Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cwpz Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.qmiqqr Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gdlx Size: 4KB - Virtual size: 571B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.epiqr Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.yahri Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.asd Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ampyss Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tkscl Size: 4KB - Virtual size: 1022B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ