Static task
static1
Behavioral task
behavioral1
Sample
6329afbabdd6df85113dcc86bc0491a0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6329afbabdd6df85113dcc86bc0491a0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
6329afbabdd6df85113dcc86bc0491a0_NeikiAnalytics.exe
-
Size
43KB
-
MD5
6329afbabdd6df85113dcc86bc0491a0
-
SHA1
f84294e56e3cc53474d935ba145497d5b310369b
-
SHA256
8f8b35a9c4545a520972f443dd46096a87f8cb7790a4cc35c6c7cc70df25ad64
-
SHA512
d805b59091cfc539436ad25f5cd7295146da04791f487801bafed37d84c74a74a76a29810893279d93a4ba19e567633f0913952826c4180b56815aef2d8bc0fa
-
SSDEEP
768:GD8FZXSaM1wX7FeVXMReeMBzEqWadtbbNHqDz3EXvgyvDyBvgDs8Dfvvvvv/vvv:icXLHX8MReHdt/Xvivy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6329afbabdd6df85113dcc86bc0491a0_NeikiAnalytics.exe
Files
-
6329afbabdd6df85113dcc86bc0491a0_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
934b91b9d79b5a12a3c8a214ccaaebc7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_beginthreadex
strncmp
rand
atoi
free
realloc
strncat
strchr
exit
strcpy
_iob
malloc
strrchr
strcat
_except_handler3
memcmp
??2@YAPAXI@Z
memset
__CxxFrameHandler
strstr
strlen
_ftol
ceil
memcpy
memmove
_strcmpi
_strnicmp
_strupr
??3@YAXPAX@Z
kernel32
GetLastError
LocalAlloc
FreeLibrary
GetCurrentThreadId
lstrcmpiA
OutputDebugStringA
CopyFileA
WinExec
GetShortPathNameA
GetEnvironmentVariableA
SetPriorityClass
GetCurrentThread
SetThreadPriority
ResumeThread
CreateMutexA
OpenEventA
GetVersionExA
GetSystemInfo
GlobalMemoryStatus
GetModuleHandleA
DeviceIoControl
GetProcessHeap
HeapAlloc
WriteFile
GetSystemDirectoryA
GetTempPathA
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
CreateEventA
CloseHandle
WaitForSingleObject
ResetEvent
lstrcpyA
Sleep
SetEvent
InterlockedExchange
CancelIo
GetProcAddress
LoadLibraryA
ReadFile
SetFilePointer
CreateFileA
GetModuleFileNameA
DeleteFileA
lstrlenA
lstrcatA
RaiseException
GetWindowsDirectoryA
GetFileSize
GetFileAttributesA
CreateProcessA
GetStartupInfoA
GetTickCount
GetCurrentProcess
TerminateThread
Process32Next
Process32First
CreateToolhelp32Snapshot
MoveFileExA
MoveFileA
urlmon
URLDownloadToFileA
iphlpapi
GetIfTable
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
SysFreeString
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ