Static task
static1
Behavioral task
behavioral1
Sample
14a2325e33b0a39899ce753634039090_NeikiAnalytics.dll
Resource
win7-20240221-en
General
-
Target
14a2325e33b0a39899ce753634039090_NeikiAnalytics.exe
-
Size
6.1MB
-
MD5
14a2325e33b0a39899ce753634039090
-
SHA1
ff540a5f563f90cbb6da63a622facae6e93cf0d1
-
SHA256
609c8df2d67291d2410e0b4765d4d22ba14e0c9a931096cf85172aa039f752f5
-
SHA512
d14934c2a3787ab01c57eca5225a4d98ab0dd12e8659b9a929c6287abc021cbf8482ce1e657beb40d3db75e5c0ef6a4348348cb812ffa995ec111d5832a123d8
-
SSDEEP
196608:eGoKy43bbYHvJkWhRU9RNH6AcBggRbACwg:+ubMHvJkWhS9PHbcilCz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14a2325e33b0a39899ce753634039090_NeikiAnalytics.exe
Files
-
14a2325e33b0a39899ce753634039090_NeikiAnalytics.exe.dll windows:6 windows x86 arch:x86
5cfdcf989804b81b1aebc96f7007a350
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
SuspendThread
DeleteFileA
VirtualQuery
ExpandEnvironmentStringsA
QueryDosDeviceW
GetFullPathNameW
GetOverlappedResult
CreateFileW
ReadConsoleW
WriteConsoleW
SetStdHandle
OutputDebugStringW
LoadLibraryExW
SetFilePointerEx
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
CloseHandle
GetModuleFileNameW
GetSystemTime
FreeEnvironmentStringsW
GetCurrentProcessId
GetModuleFileNameA
GetOEMCP
GetACP
IsValidCodePage
GetFileType
GetStdHandle
HeapSize
GetModuleHandleExW
ExitProcess
GetProcessHeap
IsDebuggerPresent
EnumSystemLocalesW
IsValidLocale
GetLocaleInfoW
LCMapStringW
FileTimeToLocalFileTime
GetStringTypeW
FindNextFileA
GetExitCodeThread
LoadLibraryA
SetLastError
GetTimeZoneInformation
lstrcpynW
GetExitCodeProcess
CreateEventA
SizeofResource
InitializeCriticalSectionAndSpinCount
OpenProcess
WaitForSingleObjectEx
GetDateFormatW
ConnectNamedPipe
GetUserDefaultLCID
CreateDirectoryW
GetEnvironmentStringsW
QueryPerformanceCounter
SetDllDirectoryW
FreeLibrary
EnumResourceNamesW
WriteFile
GetProcAddress
WideCharToMultiByte
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
MultiByteToWideChar
GetLastError
HeapFree
HeapReAlloc
GetSystemTimeAsFileTime
GetCommandLineA
GetCurrentThreadId
GetCPInfo
RaiseException
RtlUnwind
HeapAlloc
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
user32
DrawEdge
DrawFocusRect
CreateDialogIndirectParamA
PeekMessageA
SetDlgItemTextW
ToAsciiEx
ShowOwnedPopups
SetCursor
DestroyAcceleratorTable
GetSystemMenu
PostQuitMessage
IsIconic
PostMessageW
MsgWaitForMultipleObjects
DrawIconEx
LoadStringA
LoadIconA
RemovePropA
SetFocus
BeginPaint
SetScrollRange
ShowCursor
GetMenu
OffsetRect
MessageBoxA
SetWindowLongW
DefWindowProcA
DestroyCaret
GetSysColor
DrawMenuBar
SystemParametersInfoA
ValidateRgn
GetMonitorInfoW
GetMessageTime
AttachThreadInput
gdi32
CreateBitmapIndirect
SetStretchBltMode
LineTo
SetTextColor
CreateFontIndirectW
GetRegionData
CreateCompatibleBitmap
GetObjectType
GetCharABCWidthsW
Polyline
GetClipBox
RectVisible
IntersectClipRect
GetPixel
comdlg32
GetOpenFileNameW
FindTextW
advapi32
RegOpenKeyExA
RegSetValueExW
RegLoadKeyW
StartServiceW
SetSecurityDescriptorDacl
oleaut32
SysAllocStringLen
Sections
.text Size: 451KB - Virtual size: 450KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5.6MB - Virtual size: 5.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ