Static task
static1
Behavioral task
behavioral1
Sample
03538d5749a9aa2ec5ffb7fce82c5b00_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
03538d5749a9aa2ec5ffb7fce82c5b00_NeikiAnalytics.exe
-
Size
232KB
-
MD5
03538d5749a9aa2ec5ffb7fce82c5b00
-
SHA1
9d8b79395dca4a271a4c814728a739583c107cbc
-
SHA256
c9943da210477e773e7daa9206484cc37f958fce779fe00db88ddebf5b9ae415
-
SHA512
fa43fef68aa6c5add77f7638283a4f401bb92214b02fa3f26467efc3702eece7137db6a6ee0808b67bc2045ea5b93e4f91d53eb545ea9f9358106746fb809c33
-
SSDEEP
6144:WO3rIFEVIomVcSt9Nz6+dGaWKtgwkutXmRUQcDNB:dlSldG0tquJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03538d5749a9aa2ec5ffb7fce82c5b00_NeikiAnalytics.exe
Files
-
03538d5749a9aa2ec5ffb7fce82c5b00_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
3eb9ffc35334c4146a9daab9c10cbe05
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
GetProcAddress
GetModuleHandleA
GetVersionExA
SetLastError
CreateDirectoryA
SetFileAttributesA
GetFileAttributesA
CopyFileA
RemoveDirectoryA
FindNextFileA
GetSystemDirectoryA
GetUserDefaultLangID
WinExec
Sleep
SetCurrentDirectoryA
GetCurrentProcess
GetCurrentThread
FormatMessageA
HeapFree
GetProcessHeap
HeapAlloc
OpenProcess
GetTickCount
CreateProcessA
FlushFileBuffers
HeapSize
SetStdHandle
lstrcmpA
InterlockedExchange
InitializeCriticalSection
VirtualQuery
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
HeapReAlloc
VirtualAlloc
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
VirtualFree
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
FreeLibrary
LoadLibraryA
GetModuleFileNameA
SetFilePointer
GetLastError
GetPrivateProfileStringA
CreateMutexA
WaitForSingleObject
WriteFile
GetTempPathA
GetTempFileNameA
CreateFileA
GetFileSize
ReadFile
FindFirstFileA
FindClose
DeleteFileA
CloseHandle
LocalFree
lstrlenW
InterlockedIncrement
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
UnhandledExceptionFilter
GetStdHandle
TerminateProcess
SetUnhandledExceptionFilter
EnterCriticalSection
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
TlsAlloc
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
ExitProcess
LCMapStringA
LCMapStringW
GetACP
GetOEMCP
GetCPInfo
GetStringTypeA
GetStringTypeW
DeleteCriticalSection
LeaveCriticalSection
user32
LoadStringA
DefWindowProcA
PostQuitMessage
UpdateWindow
ShowWindow
CreateWindowExA
RegisterClassA
LoadIconA
DispatchMessageA
FindWindowA
KillTimer
PostMessageA
SendMessageA
SetTimer
GetMessageA
TranslateMessage
winspool.drv
EnumPrintersA
ClosePrinter
GetPrinterDriverA
OpenPrinterA
EnumPrinterDriversA
GetPrinterDriverDirectoryA
GetPrinterA
SetPrinterA
AddMonitorA
DeleteMonitorA
AddPrinterDriverA
advapi32
AllocateAndInitializeSid
LookupAccountSidA
CreateProcessAsUserA
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetLengthSid
CopySid
RegGetKeySecurity
GetSecurityDescriptorDacl
GetAclInformation
GetSidSubAuthorityCount
GetAce
GetSidSubAuthority
RegSetKeySecurity
RegDeleteKeyA
RegSetValueExA
RegDeleteValueA
RegEnumValueA
RegEnumKeyExA
RegOpenKeyExA
RegCreateKeyExA
OpenThreadToken
OpenProcessToken
GetTokenInformation
FreeSid
EqualSid
RegOpenKeyA
RegQueryValueExA
RegCloseKey
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoInitialize
CoCreateInstance
Sections
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rmnet Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE