Static task
static1
Behavioral task
behavioral1
Sample
79315f6b7dbd21f60e6221066e977780_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
79315f6b7dbd21f60e6221066e977780_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
79315f6b7dbd21f60e6221066e977780_NeikiAnalytics.exe
-
Size
69KB
-
MD5
79315f6b7dbd21f60e6221066e977780
-
SHA1
b3f58f32283660114efe1e9ec23ef7ecf39c527b
-
SHA256
0fb366bddcdfcfd1fc9d1785631f462c650e8eadf707e1f7c7c5a0173be57536
-
SHA512
ce827b8b6671b5bb3deaec5c8b5d25b758d50facfd8b0b87667e61d62c4bc4b56e7fcf1cd0d1a738c722035476acf7cb80c1bb6acfc47b126430bf53d41390f3
-
SSDEEP
768:eCVMDJ5J3eXEcdgy+FSbnKD+0r1LYpzwDu+uM9MBJ2wlD+6KQTdkjzvRCZD7+:WJ5EXEc29nz6wDuXMSJD7Gj7oD7+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 79315f6b7dbd21f60e6221066e977780_NeikiAnalytics.exe
Files
-
79315f6b7dbd21f60e6221066e977780_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
2eb47895ee25649cf9e79d6e6127836a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ShowWindow
PostQuitMessage
GetMessageA
DispatchMessageA
TranslateMessage
MoveWindow
CreateWindowExA
RegisterClassExA
DefWindowProcA
SendMessageA
LoadIconA
LoadCursorA
FillRect
GetDC
DialogBoxParamA
GetWindowRect
UpdateWindow
SetFocus
kernel32
GetModuleHandleA
GetCommandLineA
FindFirstFileA
GetCurrentDirectoryA
FindClose
CreateFileMappingA
FindNextFileA
DeleteFileA
CloseHandle
GetCurrentProcessId
GetCurrentProcess
GetCurrentThreadId
GetLastError
gdi32
CreateSolidBrush
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 493B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ