rocGetDigInt
Static task
static1
Behavioral task
behavioral1
Sample
4cd011c7f2eaaa69a5b9c11add413c30_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4cd011c7f2eaaa69a5b9c11add413c30_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
4cd011c7f2eaaa69a5b9c11add413c30_NeikiAnalytics.exe
-
Size
335KB
-
MD5
4cd011c7f2eaaa69a5b9c11add413c30
-
SHA1
cf0a9bb75b39ecfb696b8f5aa48c693033b22076
-
SHA256
c46ed7486f4fac2fae6ee765ab5552b4d22c92595f1cde03be2b5344f7d2a389
-
SHA512
44f865c10638294e1d10ebc5692e6ca75e6c9b73cd0a20e25656c6520e688ce732f4c3e4211a61aef260edbd841c738f8c270910436f78cb35c71c27bc7f3ab0
-
SSDEEP
6144:bdqguB4iH0m7e0mBRckEux/UFRjLZdNbc3Ij:bdXuB4iH0m7e0mgK/EjLZdNbc3Ij
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4cd011c7f2eaaa69a5b9c11add413c30_NeikiAnalytics.exe
Files
-
4cd011c7f2eaaa69a5b9c11add413c30_NeikiAnalytics.exe.dll windows:4 windows x64 arch:x64
5277312ed7e2278fe66590912a2e2774
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
advapi32
AdjustTokenPrivileges
GetUserNameA
LookupPrivilegeValueA
OpenProcessToken
iphlpapi
GetAdaptersInfo
kernel32
ClearCommError
CloseHandle
CreateEventA
CreateFileA
CreateMutexA
DeleteCriticalSection
EnterCriticalSection
EscapeCommFunction
GetCommConfig
GetCommModemStatus
GetCommState
GetCommTimeouts
GetComputerNameA
GetCurrentProcess
GetCurrentThreadId
GetEnvironmentVariableA
GetFileSize
GetLastError
GetSystemTime
GetVersionExA
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
MultiByteToWideChar
OpenEventA
OpenMutexA
PurgeComm
QueryPerformanceCounter
QueryPerformanceFrequency
ReadFile
ReleaseMutex
ResetEvent
SetCommConfig
SetCommState
SetCommTimeouts
SetEvent
SetThreadPriority
Sleep
TerminateThread
TlsGetValue
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
mpr
WNetGetConnectionA
msvcrt
___lc_codepage_func
___mb_cur_max_func
__iob_func
__setusermatherr
_amsg_exit
_beginthread
_chdir
_errno
_fstat64
_getcwd
_getpid
_initterm
_localtime64
_lock
_mktime64
_stat64
_stricmp
_strnicmp
_time64
_unlock
_utime
abort
acos
asin
atan
atof
atoi
atol
calloc
fclose
fflush
fopen
fputc
fputs
fread
free
fseek
ftell
fwrite
getenv
localeconv
malloc
memchr
memcmp
memcpy
memmove
memset
qsort
realloc
remove
rename
srand
strcat
strchr
strcmp
strcpy
strerror
strlen
strncat
strncmp
strncpy
strrchr
strstr
strtol
system
tan
tolower
toupper
vfprintf
wcslen
_rmdir
_mkdir
_fileno
_fdopen
_access
user32
ExitWindowsEx
winmm
timeBeginPeriod
timeEndPeriod
ws2_32
WSAGetLastError
WSAStartup
accept
bind
closesocket
connect
gethostbyname
gethostname
getnameinfo
getpeername
getsockname
htonl
htons
inet_addr
inet_ntoa
ioctlsocket
listen
ntohs
recv
recvfrom
send
sendto
setsockopt
socket
Exports
Exports
Sections
.text Size: 229KB - Virtual size: 229KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 17KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 76B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ