xbpbxnxouib8mt
Static task
static1
Behavioral task
behavioral1
Sample
36240d05698e1b3931c9a4468d0652d0_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
36240d05698e1b3931c9a4468d0652d0_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
36240d05698e1b3931c9a4468d0652d0_NeikiAnalytics.exe
-
Size
764KB
-
MD5
36240d05698e1b3931c9a4468d0652d0
-
SHA1
e422b72aec8f7da0742571e4561f665f171c0581
-
SHA256
653e291f462586d03db9a98b18010deb18e547da2b028f0b2ffe25d7b6d086cc
-
SHA512
287acc10e22a7bd329c4cc9268fb2e1703168d696cda321846dbf1c3f64f2e8d23fd41f332f4bdad322add4a046cd683400f34418a17964b8ecd089677e8f247
-
SSDEEP
6144:si05kH9OyU2uv5SRf/FWgFgtBgqIRAUW9kVYeVprU4wfhTv5xD2ZP0GVGdXcukT4:HrHGPv5Smpt6DmUWuVZkxikdXcq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 36240d05698e1b3931c9a4468d0652d0_NeikiAnalytics.exe
Files
-
36240d05698e1b3931c9a4468d0652d0_NeikiAnalytics.exe.dll windows:4 windows x64 arch:x64
9a873558f9739b47d573400f9a0176b2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
mprapi
MprAdminInterfaceTransportAdd
user32
GetDoubleClickTime
kernel32
GetBinaryTypeW
SetLastError
GetCurrentThreadId
MulDiv
ExitProcess
EnumResourceTypesA
GetModuleHandleA
GetModuleFileNameW
CreateDirectoryA
GetLastError
crypt32
CryptFreeOIDFunctionAddress
winmm
midiInReset
Exports
Exports
BrandingFormatString
BrandingFormatStringForEdition
BrandingLoadBitmap
BrandingLoadCursor
BrandingLoadIcon
BrandingLoadImage
BrandingLoadNeutralStringForEdition
BrandingLoadString
BrandingLoadStringForEdition
EulaFreeBuffer
GetEULAFile
GetEULAInCurrentUILanguage
GetHinstanceByNameSpace
GetInstalledEULAPath
InstallEULA
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.code Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sbss Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.crt Size: 160KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 996B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.xlhmxa Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hxtf Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.omweh Size: 280KB - Virtual size: 276KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.inruls Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rrasht Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vgpz Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.siac Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xkh Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.lxd Size: 4KB - Virtual size: 539B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ