Static task
static1
Behavioral task
behavioral1
Sample
2c65c2eb1b25083d1da8d49a6559dad0_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
2c65c2eb1b25083d1da8d49a6559dad0_NeikiAnalytics.exe
-
Size
3.4MB
-
MD5
2c65c2eb1b25083d1da8d49a6559dad0
-
SHA1
0bdecbcb0a9c8a99dd11e6d2476e3481226493d1
-
SHA256
3ba4a431a3f7c088cc5959bd8bdc68d7a0ae19f519160d586600558de4ba9489
-
SHA512
d5e342bc49bb1cae4c546bd811a89d125cfd44082450bc7783e2cd4ed214227cea7676739758832a29cf88fec2f099c3446d72bea0d9f74306a227385a79d8b8
-
SSDEEP
49152:TGtlquPIU6if3F+LFQrkoovR0KjztduHb/MS65Q3xyABN8Lt6Mz+FmjiPgxukTbS:3+fQVvR0Kj/NeMfz+FC7xu9d
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c65c2eb1b25083d1da8d49a6559dad0_NeikiAnalytics.exe
Files
-
2c65c2eb1b25083d1da8d49a6559dad0_NeikiAnalytics.exe.exe windows:6 windows x64 arch:x64
2087200a222f7ec3d41221eb467025b4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ws2_32
select
__WSAFDIsSet
inet_pton
WSASetLastError
shutdown
bind
getnameinfo
gethostname
sendto
recvfrom
ntohl
freeaddrinfo
getaddrinfo
ioctlsocket
listen
htonl
socket
send
recv
closesocket
accept
WSACleanup
WSAStartup
WSAIoctl
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
WSAGetLastError
wldap32
ord46
ord211
ord60
ord22
ord45
ord50
ord301
ord200
ord30
ord79
ord35
ord33
ord32
ord27
ord26
ord41
ord143
crypt32
CertFreeCertificateChainEngine
CertGetCertificateContextProperty
CertDuplicateCertificateContext
CertFreeCertificateChain
CertGetCertificateChain
CertCreateCertificateChainEngine
CryptQueryObject
CertGetNameStringA
CertAddCertificateContextToStore
CryptStringToBinaryA
CertFreeCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertOpenStore
advapi32
CryptEnumProvidersW
CryptSignHashW
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptAcquireContextW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGenRandom
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
GetSidSubAuthorityCount
GetSidSubAuthority
CopySid
IsValidSid
OpenProcessToken
ConvertSidToStringSidW
GetLengthSid
GetTokenInformation
kernel32
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
RtlUnwindEx
RtlLookupFunctionEntry
RtlCaptureContext
InitializeSListHead
InterlockedPushEntrySList
RtlPcToFileHeader
LoadLibraryExW
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualQuery
ExitThread
FreeLibraryAndExitThread
SetConsoleCtrlHandler
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
SetFilePointerEx
GetCommandLineA
GetCommandLineW
GetConsoleOutputCP
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
SetStdHandle
FlushFileBuffers
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetEndOfFile
WriteConsoleW
UnhandledExceptionFilter
GetFileType
GetFileSizeEx
WriteProcessMemory
HeapFree
SetConsoleTitleA
GetCurrentProcess
GetStdHandle
WriteFile
TerminateProcess
GetModuleFileNameW
InitializeCriticalSectionEx
WaitForSingleObject
CreateFileW
ResumeThread
OpenProcess
HeapSize
CreateToolhelp32Snapshot
Sleep
GetLastError
Process32NextW
Process32FirstW
HeapReAlloc
CloseHandle
LoadLibraryW
HeapAlloc
DecodePointer
HeapDestroy
GetThreadContext
VirtualAllocEx
LocalFree
DeleteCriticalSection
GetProcessHeap
CreateProcessW
WideCharToMultiByte
GetConsoleWindow
CreateRemoteThread
VirtualFreeEx
SetThreadContext
GetExitCodeProcess
GetProcessId
LocalAlloc
GetCurrentThread
RaiseException
CreateThread
Module32FirstW
Beep
GetProcAddress
DebugActiveProcess
ExitProcess
GetCurrentProcessId
GetModuleHandleW
Module32NextW
IsDebuggerPresent
CheckRemoteDebuggerPresent
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
FormatMessageA
GetTickCount
EnterCriticalSection
LeaveCriticalSection
SleepEx
VerSetConditionMask
GetSystemDirectoryA
FreeLibrary
GetModuleHandleA
LoadLibraryA
VerifyVersionInfoA
WaitForSingleObjectEx
ExpandEnvironmentStringsA
RtlUnwind
ReadFile
PeekNamedPipe
WaitForMultipleObjects
CreateFileA
GetEnvironmentVariableW
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
MultiByteToWideChar
FormatMessageW
GetSystemTimeAsFileTime
RtlVirtualUnwind
SwitchToFiber
DeleteFiber
CreateFiber
ConvertFiberToThread
ConvertThreadToFiber
FindClose
FindFirstFileW
FindNextFileW
GetSystemTime
SystemTimeToFileTime
OutputDebugStringW
GetCPInfo
GetStringTypeW
SleepConditionVariableSRW
WakeAllConditionVariable
LCMapStringEx
EncodePointer
TryAcquireSRWLockExclusive
AcquireSRWLockExclusive
GetCurrentDirectoryW
FindFirstFileExW
GetFileAttributesExW
GetFileInformationByHandle
GetFullPathNameW
AreFileApisANSI
MoveFileExW
GetFileInformationByHandleEx
GetLocaleInfoEx
ReleaseSRWLockExclusive
user32
FindWindowW
MessageBoxW
GetWindowLongW
FindWindowA
GetProcessWindowStation
GetUserObjectInformationW
SetWindowLongW
MessageBoxA
ShowWindow
shell32
ShellExecuteA
bcrypt
BCryptGenRandom
userenv
UnloadUserProfile
rpcrt4
RpcStringFreeA
UuidToStringA
UuidCreate
wininet
InternetCloseHandle
InternetReadFile
InternetOpenW
InternetOpenUrlW
Sections
.text Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 785KB - Virtual size: 785KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ