Static task
static1
Behavioral task
behavioral1
Sample
0a334e88fe39fd425c75df65e8824f70_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0a334e88fe39fd425c75df65e8824f70_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
0a334e88fe39fd425c75df65e8824f70_NeikiAnalytics.exe
-
Size
244KB
-
MD5
0a334e88fe39fd425c75df65e8824f70
-
SHA1
279f86ea69b1abe38d766345f72d938f050f8bd7
-
SHA256
57dcac0c355a922b1ed4ce9760083a67931d9da3dca452578fbe7e706b303c0a
-
SHA512
23506431a6ef4eb23540a5b7383f2fb33f279bd61a1604a5fcef15fb48a5c8e094dd7c49cc77b76dc6682a19a652c2d49e15c284df91a1e23e6460405b08e3f5
-
SSDEEP
6144:e8sy5TAlBQoX554vSl3xFDVudUMNVzGCT:eHy5TAlBQoX55N2UA6S
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a334e88fe39fd425c75df65e8824f70_NeikiAnalytics.exe
Files
-
0a334e88fe39fd425c75df65e8824f70_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
aa3a26f1a06b11686f3ca07b71141ef7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
GetStringTypeA
FlushFileBuffers
GetStringTypeW
IsBadCodePtr
IsBadReadPtr
SetStdHandle
GetFileType
GetStdHandle
SetUnhandledExceptionFilter
GetEnvironmentStringsW
GetEnvironmentStrings
SetHandleCount
FreeEnvironmentStringsA
UnhandledExceptionFilter
FreeEnvironmentStringsW
LCMapStringW
LCMapStringA
HeapSize
SetFilePointer
GetCurrentProcess
WideCharToMultiByte
WriteFile
IsBadWritePtr
TerminateProcess
VirtualFree
HeapCreate
VirtualAlloc
ExitProcess
GetVersion
HeapDestroy
GetStartupInfoA
GetCommandLineA
HeapAlloc
HeapReAlloc
RtlUnwind
lstrlenA
GetACP
GetOEMCP
GetModuleHandleA
CreateSemaphoreA
CloseHandle
WaitForSingleObject
ReleaseSemaphore
LocalFree
FormatMessageA
GetLastError
LoadLibraryA
GetProcAddress
SetEndOfFile
HeapFree
MultiByteToWideChar
GetVersionExA
GetFileAttributesA
GetModuleFileNameA
GetCurrentProcessId
GetCurrentDirectoryA
ReadFile
CreateFileA
GetFullPathNameA
GetDriveTypeA
user32
InvalidateRect
DispatchMessageA
GetActiveWindow
CreateWindowExA
DefWindowProcA
LoadImageA
LoadBitmapA
UnregisterClassA
GetMessageA
SetCursor
MapWindowPoints
ShowWindow
UpdateWindow
GetParent
KillTimer
DestroyCursor
RedrawWindow
GetClientRect
ScreenToClient
PostQuitMessage
DestroyWindow
EndPaint
GetSysColor
SetWindowLongA
BeginPaint
GetCursorPos
GetWindowLongA
SetTimer
LoadCursorA
CallWindowProcA
EnableWindow
RegisterWindowMessageA
DrawFrameControl
GetWindowTextA
PtInRect
TrackPopupMenuEx
SetWindowTextA
GetDlgItem
TranslateAcceleratorA
SetMenu
GetMenu
LoadIconA
DestroyAcceleratorTable
DrawMenuBar
GetMenuItemCount
DeleteMenu
SetFocus
GetDesktopWindow
ClientToScreen
DestroyMenu
SetParent
MoveWindow
AppendMenuA
CreateMenu
CreatePopupMenu
GetWindowDC
ModifyMenuA
EnableMenuItem
DestroyIcon
GetSystemMetrics
DrawStateA
GetWindowRect
CreateAcceleratorTableA
SetWindowPos
DrawFocusRect
PostMessageA
RegisterClassExA
GetDC
FillRect
DrawTextA
TranslateMessage
ReleaseDC
IsDialogMessageA
MessageBoxA
SendMessageA
SetClassLongA
gdi32
CreatePatternBrush
CreatePen
CreateCompatibleBitmap
GetPixel
SetBkMode
GetTextExtentPoint32A
CreateRectRgn
SelectClipRgn
ExtTextOutA
Rectangle
MoveToEx
LineTo
CreateBrushIndirect
GetStockObject
GetNearestColor
GetDeviceCaps
SetTextColor
CreateSolidBrush
PatBlt
CreateBitmap
DeleteDC
CreateFontIndirectA
StretchBlt
BitBlt
DeleteObject
GetObjectA
CreateCompatibleDC
SelectObject
SetBkColor
shell32
ShellExecuteA
ole32
CoUninitialize
CoInitialize
comctl32
CreatePropertySheetPageA
InitCommonControlsEx
ord13
ord16
PropertySheetA
ord15
ord14
ImageList_Destroy
ImageList_LoadImageA
winmm
PlaySoundA
msimg32
TransparentBlt
Sections
.text Size: 184KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ