Static task
static1
Behavioral task
behavioral1
Sample
79571538140b71defb12f17dabc40dc0_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
79571538140b71defb12f17dabc40dc0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
79571538140b71defb12f17dabc40dc0_NeikiAnalytics.exe
-
Size
1.6MB
-
MD5
79571538140b71defb12f17dabc40dc0
-
SHA1
041aedff07b4e25fc598d99846321e57fa603b6f
-
SHA256
b3ef456203765f07ec2ce47db06e0f465c3d3b85c4d96821b0befbd6100afc60
-
SHA512
014d4e6a510f1b4ff65a18df8d4e3cab0957272e744a7165dd3140b3011cc3e8cf20b7b8bd62cc21cfdc2b3b1650c9c164e12902c0946ebd52f506cd658dcc9c
-
SSDEEP
24576:BfpeDNUJG+9YE5RlkdMkje3G1nZcfmA7gxR7y64xJ9bxWE+rpVe2:njG+zRcMk7KrSwFMrpVX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 79571538140b71defb12f17dabc40dc0_NeikiAnalytics.exe
Files
-
79571538140b71defb12f17dabc40dc0_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
8c61f5a8719cd7fa65798ecb6850cf52
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyA
RegCloseKey
user32
GetKeyboardType
DestroyWindow
MessageBoxA
TranslateMessage
ShowWindow
SetWindowTextA
SetWindowPlacement
SetTimer
SetFocus
SetDlgItemTextA
SendMessageA
SendDlgItemMessageA
PostMessageA
PeekMessageA
OemToCharA
MessageBoxA
LoadIconA
KillTimer
IsWindowVisible
IsWindow
IsDlgButtonChecked
GetWindowTextLengthA
GetWindowPlacement
GetDlgItemTextA
GetDlgItem
GetDialogBaseUnits
GetClassNameA
EnumChildWindows
EndDialog
EnableWindow
DispatchMessageA
DialogBoxParamA
DestroyWindow
CheckRadioButton
kernel32
GetACP
Sleep
VirtualFree
VirtualAlloc
GetCurrentThreadId
VirtualQuery
SetCurrentDirectoryA
GetStartupInfoA
GetLastError
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
lstrcmpiA
WriteFile
WinExec
SetFileTime
SetFilePointer
SetEnvironmentVariableA
ReadFile
MulDiv
LocalFileTimeToFileTime
GetVolumeInformationA
GetVersionExA
GetTickCount
GetTempFileNameA
GetShortPathNameA
GetModuleFileNameA
GetFullPathNameA
GetFileSize
GetFileAttributesA
GetDriveTypeA
GetCurrentDirectoryA
FreeLibrary
ExpandEnvironmentStringsA
DosDateTimeToFileTime
DeleteFileA
CreateFileA
CreateDirectoryA
CloseHandle
Beep
shell32
SHGetFileInfoA
ShellExecuteA
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
comctl32
InitCommonControls
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 1024B - Virtual size: 704B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 12KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ