Static task
static1
Behavioral task
behavioral1
Sample
b5705a7141020c6d5caa0ebc334bd830_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b5705a7141020c6d5caa0ebc334bd830_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
b5705a7141020c6d5caa0ebc334bd830_NeikiAnalytics.exe
-
Size
528KB
-
MD5
b5705a7141020c6d5caa0ebc334bd830
-
SHA1
f34096083df6001a8e7c09ac491805887f81e277
-
SHA256
4340a404bac252713516d4db102ec9e6d248e3f3a978d7f6464cfe72fbf64102
-
SHA512
10b2fc23f1458f6970ab9f179aa5b1cbeae372dec4681ea0d0c99f76f9aa3d189984aaf3166388bdf32fe033e0bed7904968c5fda4546ed6ea47a64f6159cef3
-
SSDEEP
6144:xwaUWnZuRftBs2d6r57E+P7UvU7DrYBPZH:QWZuR8OO5Y+D8oW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b5705a7141020c6d5caa0ebc334bd830_NeikiAnalytics.exe
Files
-
b5705a7141020c6d5caa0ebc334bd830_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
3868270d8725df9020e9a798ba9b789e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
timeGetTime
shlwapi
PathRelativePathToA
PathIsRelativeA
PathCompactPathA
PathCanonicalizeA
comctl32
InitCommonControlsEx
nvcuvid
cuvidCreateVideoParser
cuvidDecodePicture
cuvidParseVideoData
cuvidDestroyVideoParser
cuvidMapVideoFrame
cuvidUnmapVideoFrame
cuvidDestroyDecoder
cuvidCreateDecoder
nvcuda
cuDeviceGetName
cuDeviceComputeCapability
cuDeviceTotalMem
cuDeviceGetAttribute
cuStreamCreate
cuModuleLoad
cuModuleGetFunction
cuStreamDestroy
cuMemFreeHost
cuCtxDestroy
cuInit
cuD3D9CtxCreate
cuDeviceGetCount
cuDeviceGet
cuCtxCreate
cuMemcpyDtoH
cuMemFree
cuMemAlloc
cuFuncSetBlockShape
cuParamSeti
cuParamSetSize
cuLaunchGrid
iphlpapi
GetAdaptersInfo
d3d9
Direct3DCreate9
kernel32
GetStringTypeW
GetStringTypeA
FlushFileBuffers
SetEndOfFile
GetLocaleInfoA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
FreeEnvironmentStringsA
HeapSize
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetEnvironmentStrings
CreateFileA
Sleep
WaitForSingleObject
ResetEvent
ExitThread
CreateThread
SetEvent
SetPriorityClass
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetCurrentDirectoryA
SetCurrentDirectoryA
CloseHandle
SuspendThread
ResumeThread
GetCurrentProcess
SetThreadPriority
CreateEventA
GetModuleFileNameA
GetProcAddress
GetModuleHandleA
OutputDebugStringA
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStdHandle
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetStartupInfoA
GetProcessHeap
GetVersionExA
GetCommandLineA
RtlUnwind
HeapReAlloc
DeleteFileA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
SetStdHandle
SetFilePointer
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
WriteFile
ReadFile
MultiByteToWideChar
ExitProcess
GetSystemTimeAsFileTime
HeapFree
GetLastError
HeapAlloc
GetFileType
SetHandleCount
GetTimeZoneInformation
CompareStringA
CompareStringW
SetEnvironmentVariableA
LoadLibraryA
InitializeCriticalSection
GetDriveTypeA
IsWow64Process
GetFullPathNameA
user32
GetSysColorBrush
RegisterClassA
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
GetMessageA
IsIconic
ReleaseDC
DrawIconEx
PostQuitMessage
SetForegroundWindow
SendMessageA
GetWindowLongA
GetMenu
GetMenuItemInfoA
RemoveMenu
GetDC
InsertMenuItemA
SetWindowTextA
EnableMenuItem
SetWindowPos
EnableWindow
DrawMenuBar
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetSubMenu
CreateDialogParamA
SetFocus
GetDlgItemInt
SetDlgItemInt
GetWindowRect
MoveWindow
ShowWindow
DestroyWindow
SendDlgItemMessageA
EndDialog
GetDlgItemTextA
SetCapture
GetClientRect
BeginPaint
FillRect
EndPaint
ReleaseCapture
DefWindowProcA
InvalidateRect
GetDesktopWindow
CheckMenuItem
DialogBoxParamA
PostMessageA
SetDlgItemTextA
MessageBoxA
LoadStringA
LoadAcceleratorsA
GetDlgItem
RedrawWindow
LoadImageA
gdi32
BitBlt
GetObjectA
DeleteDC
CreatePen
CreateCompatibleDC
SetDIBitsToDevice
CreateSolidBrush
SelectObject
DeleteObject
Rectangle
comdlg32
GetSaveFileNameA
GetOpenFileNameA
shell32
ShellExecuteA
SHGetPathFromIDListA
SHBrowseForFolderA
DragFinish
DragQueryFileA
DragAcceptFiles
ole32
CoTaskMemFree
Sections
.text Size: 272KB - Virtual size: 268KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 62.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 212KB - Virtual size: 208KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ