Static task
static1
Behavioral task
behavioral1
Sample
0d0a5c562859740eca68e433b744ea30_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0d0a5c562859740eca68e433b744ea30_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
0d0a5c562859740eca68e433b744ea30_NeikiAnalytics.exe
-
Size
13KB
-
MD5
0d0a5c562859740eca68e433b744ea30
-
SHA1
a937d775dc25fdb9588c8ec7f950b5f7038441cd
-
SHA256
2497410afcf250013f7b8c11e6e60007353f570d4bb0eb3d96b4c1c8829caf29
-
SHA512
3e912d65df1a4171d9748c7ac3f965bd8cb73b504455ad1f63f56c4574d354ef1b52fb8e3b993125b233519cd9df4a31eed57a053f8eff44cfa3d95d0951e76c
-
SSDEEP
192:m6KI16BveuiSxW6Z+QM/4YNtGcGsBGFNJP1GrCBi+jpEFiQWlJdxqHbrL1x:g/di+EfAvmcQWlJj+5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d0a5c562859740eca68e433b744ea30_NeikiAnalytics.exe
Files
-
0d0a5c562859740eca68e433b744ea30_NeikiAnalytics.exe.exe windows:4 windows x64 arch:x64
19f0506f081e5c6810491056d5eca8bf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
msvcrt
memset
printf
memcpy
memmove
rand
wcslen
strcmp
srand
strtol
_wsystem
_vsnprintf
_vsnwprintf
__set_app_type
_controlfp
__argc
__argv
_environ
__getmainargs
exit
kernel32
FileTimeToSystemTime
GetProcessHeap
HeapAlloc
HeapSize
HeapReAlloc
CreateFileW
GetLastError
Sleep
WriteFile
HeapFree
CloseHandle
SleepEx
GetCommandLineW
ExpandEnvironmentStringsW
ntdll
NtQuerySystemInformation
RtlGetNtVersionNumbers
winhttp
WinHttpOpen
WinHttpConnect
WinHttpOpenRequest
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpCloseHandle
bcrypt
BCryptEnumContexts
BCryptEnumRegisteredProviders
BCryptFinishHash
BCryptFreeBuffer
BCryptGenerateKeyPair
BCryptGenRandom
BCryptGetFipsAlgorithmMode
BCryptHashData
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ