Static task
static1
Behavioral task
behavioral1
Sample
7b26c4608dcbd94a1088b09775862de0_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7b26c4608dcbd94a1088b09775862de0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
7b26c4608dcbd94a1088b09775862de0_NeikiAnalytics.exe
-
Size
43KB
-
MD5
7b26c4608dcbd94a1088b09775862de0
-
SHA1
cd3bf6220ca6a5c0fcff79d82b9fd708ed530c2c
-
SHA256
04da3e05106ffd182c2b2320555768a774753ade12ef6e12d4ef86bf8d2ef370
-
SHA512
4bbfca785501b5e037fa7ddabb23101567e527cfae9d9129fc33ff7984e0957ec6a9943995a0d1262c74d526030f1b394f244a594a4c23749f5a51a8068db286
-
SSDEEP
768:GD8FZXSaM1wX7FeVXMReeMBzEqWaTtbbNHqDz3EXvgyvDyBvgDs8Dfvvvvv/vvv:icXLHX8MReHTt/Xvivy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7b26c4608dcbd94a1088b09775862de0_NeikiAnalytics.exe
Files
-
7b26c4608dcbd94a1088b09775862de0_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
934b91b9d79b5a12a3c8a214ccaaebc7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_beginthreadex
strncmp
rand
atoi
free
realloc
strncat
strchr
exit
strcpy
_iob
malloc
strrchr
strcat
_except_handler3
memcmp
??2@YAPAXI@Z
memset
__CxxFrameHandler
strstr
strlen
_ftol
ceil
memcpy
memmove
_strcmpi
_strnicmp
_strupr
??3@YAXPAX@Z
kernel32
GetLastError
LocalAlloc
FreeLibrary
GetCurrentThreadId
lstrcmpiA
OutputDebugStringA
CopyFileA
WinExec
GetShortPathNameA
GetEnvironmentVariableA
SetPriorityClass
GetCurrentThread
SetThreadPriority
ResumeThread
CreateMutexA
OpenEventA
GetVersionExA
GetSystemInfo
GlobalMemoryStatus
GetModuleHandleA
DeviceIoControl
GetProcessHeap
HeapAlloc
WriteFile
GetSystemDirectoryA
GetTempPathA
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
CreateEventA
CloseHandle
WaitForSingleObject
ResetEvent
lstrcpyA
Sleep
SetEvent
InterlockedExchange
CancelIo
GetProcAddress
LoadLibraryA
ReadFile
SetFilePointer
CreateFileA
GetModuleFileNameA
DeleteFileA
lstrlenA
lstrcatA
RaiseException
GetWindowsDirectoryA
GetFileSize
GetFileAttributesA
CreateProcessA
GetStartupInfoA
GetTickCount
GetCurrentProcess
TerminateThread
Process32Next
Process32First
CreateToolhelp32Snapshot
MoveFileExA
MoveFileA
urlmon
URLDownloadToFileA
iphlpapi
GetIfTable
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
SysFreeString
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ