Static task
static1
Behavioral task
behavioral1
Sample
48bfd2d1bbde66868d63d5a276d90160_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
48bfd2d1bbde66868d63d5a276d90160_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
48bfd2d1bbde66868d63d5a276d90160_NeikiAnalytics.exe
-
Size
2.4MB
-
MD5
48bfd2d1bbde66868d63d5a276d90160
-
SHA1
ab73c4f35b6edd8cb0b5a9a9998197dcab63871f
-
SHA256
d9127a5007c321ec745587bc56aad714f24a843f5b9cd6ecfbabaca6e1bcf123
-
SHA512
80fba07ba8ce49afd21eace3e17407b3f1b69e832874311d975a41892453ea5d5e0f70a95c7edf06ea2a21867ad91c36e436f572971c3d17a4f9af879eee5a50
-
SSDEEP
49152:y3bX3o300Th6THMvQilutg/OHjNJItMAzsMB3RTslFh1PUtEfINnmUmJYVfk:t/QTsJ6Rb23larFCfNntrk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 48bfd2d1bbde66868d63d5a276d90160_NeikiAnalytics.exe
Files
-
48bfd2d1bbde66868d63d5a276d90160_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
bd89f7262df265fa57e6f1e54cdb50f0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
crtdll
wcslen
wcschr
wcsrchr
wcscspn
_splitpath
atoi
strncpy
_close
_read
_lseek
_filelength
_open
??3@YAXPAX@Z
wcscat
wcsstr
strrchr
fclose
free
fread
malloc
ftell
fseek
fopen
memcpy
fwrite
fgetc
wcscpy
strstr
strchr
strtok
??2@YAPAXI@Z
memset
kernel32
lstrlenA
lstrcpyA
lstrcatA
FreeLibrary
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
CreateDirectoryA
IsDBCSLeadByte
CloseHandle
SetFileTime
CreateFileA
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetSystemDirectoryA
GetWindowsDirectoryA
GetTempPathA
lstrcmpA
Sleep
GetModuleFileNameA
RemoveDirectoryA
SetFileAttributesA
lstrcmpiA
FindClose
FindNextFileA
GetFileAttributesA
GlobalFree
GlobalHandle
DeleteFileA
WaitForSingleObject
CreateThread
GlobalLock
GlobalReAlloc
GlobalAlloc
FileTimeToDosDateTime
FileTimeToLocalFileTime
GetFileSize
GetFileTime
GetCurrentProcess
GetProcAddress
GetExitCodeProcess
CreateProcessA
GetShortPathNameA
FindFirstFileA
ExitProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
SearchPathA
user32
SetWindowPos
CreateWindowExA
DestroyWindow
InvalidateRect
MessageBoxA
DispatchMessageA
TranslateMessage
PostQuitMessage
PeekMessageA
MessageBeep
GetMessageA
FindWindowA
IsWindow
WaitForInputIdle
CreateDialogParamA
ShowWindow
UpdateWindow
wsprintfA
GetDlgItem
DestroyIcon
IsDialogMessageA
GetDlgItemTextA
SetDlgItemTextA
IsDlgButtonChecked
EndDialog
DialogBoxParamA
SendMessageA
LoadStringA
shell32
ShellExecuteA
SHGetSpecialFolderLocation
SHGetMalloc
SHGetFileInfoA
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteExA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
ole32
CoTaskMemFree
comctl32
ord17
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ