Static task
static1
Behavioral task
behavioral1
Sample
3ef3cdb29af845b1c9bbd7e54401ae40_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3ef3cdb29af845b1c9bbd7e54401ae40_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
3ef3cdb29af845b1c9bbd7e54401ae40_NeikiAnalytics.exe
-
Size
949KB
-
MD5
3ef3cdb29af845b1c9bbd7e54401ae40
-
SHA1
679378805537c23c63f5b088834445cd1339705e
-
SHA256
9cdad615e57e2d7cd3058cb4f8f3e65933c079e9ab9f40a2956cac39e97f7368
-
SHA512
5dc20576b6fc5f2a8f0bfcfefbb556f554093efde3cc3e7e25030266ff1588916685caa77ca73a1d71ddcaa3f1ba22d04c1e52d82394733c382ad2326e44df1e
-
SSDEEP
12288:isbnRmGL0aiHujJ42A9ZnbM7Cy2u3abwiaEfpUHFAPmp5:iVGuWJe9Zng7Cy2I2wehUlX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ef3cdb29af845b1c9bbd7e54401ae40_NeikiAnalytics.exe
Files
-
3ef3cdb29af845b1c9bbd7e54401ae40_NeikiAnalytics.exe.exe windows:4 windows x64 arch:x64
fb6a2fb05304c0c15509adb63e669167
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
DeleteCriticalSection
EnterCriticalSection
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetFileAttributesA
GetFullPathNameA
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTempPathA
GetTickCount
GetTimeZoneInformation
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
MultiByteToWideChar
QueryPerformanceCounter
RtlAddFunctionTable
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WideCharToMultiByte
msvcrt
__C_specific_handler
__dllonexit
__doserrno
__getmainargs
__initenv
__iob_func
__lconv_init
__mb_cur_max
__pioinfo
__set_app_type
__setusermatherr
_access
_acmdln
_amsg_exit
_cexit
_ctime64
_errno
_exit
_filelengthi64
_fileno
_findclose
_findfirst64
_findnext64
_fmode
_fstat64
_fullpath
_initterm
_lock
_lseeki64
_onexit
_stat64
_stricmp
_strnicmp
_time64
_unlock
_write
abort
atoi
calloc
exit
fclose
ferror
fflush
fgetpos
fopen
fputc
fread
free
fseek
fsetpos
ftell
fwprintf
fwrite
getc
getenv
islower
isspace
isupper
isxdigit
localeconv
malloc
memchr
memcmp
memcpy
memmove
memset
putc
putchar
qsort
raise
realloc
setlocale
signal
strcat
strchr
strcmp
strcoll
strcpy
strcspn
strerror
strlen
strncat
strncmp
strncpy
strpbrk
strrchr
strspn
strstr
strtol
strtoul
tolower
ungetc
wcscpy
wcslen
_snwprintf
_unlink
_umask
_strdup
_open
_mktemp
_mkdir
_getpid
_getcwd
_fileno
_fdopen
_close
_chmod
user32
CharLowerBuffA
MessageBoxW
Sections
.text Size: 657KB - Virtual size: 657KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 230KB - Virtual size: 230KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 25KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE