Static task
static1
Behavioral task
behavioral1
Sample
4a21d5d8d6459f1fd36ce2770eaa2b30_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4a21d5d8d6459f1fd36ce2770eaa2b30_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
4a21d5d8d6459f1fd36ce2770eaa2b30_NeikiAnalytics.exe
-
Size
571KB
-
MD5
4a21d5d8d6459f1fd36ce2770eaa2b30
-
SHA1
ba1d55afcb5918709fd5f0db65263972c9f45d55
-
SHA256
e2de2a02d964a7524c130e5f6784f0d5cb80f4167e8f7e15b0969cb553e58b15
-
SHA512
035b7b13ac5816918f7ec5da98a14f8efe273ed7b78e0f436ff0ef92c9c21ee58b1d412ed09af744661897b1e216e2da2e8dbef7b4f0c9aa4f72e3b1544761b0
-
SSDEEP
12288:4kf5bmI7H+nrdlQunmC4/sQNFwQXAe86yq1PDOPPBA:4kxbmEgrnQPLDuQXWsPDsA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a21d5d8d6459f1fd36ce2770eaa2b30_NeikiAnalytics.exe
Files
-
4a21d5d8d6459f1fd36ce2770eaa2b30_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
9083eabae55e2e91424ff0b20489957c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetStretchBltMode
GetDCPenColor
GetPolyFillMode
GetDCBrushColor
SetTextJustification
GetRandomRgn
GetMapMode
SetTextAlign
UpdateColors
GetObjectType
GetTextCharsetInfo
SetPixel
GetDeviceCaps
GetCurrentObject
GetSystemPaletteUse
GetTextCharset
GetClipRgn
GetFontLanguageInfo
GetBkColor
GetMetaRgn
user32
GetMenuItemCount
EnableWindow
GetWindowDC
GetDC
GetForegroundWindow
GetMenu
GetMenuState
RemovePropA
GetWindowLongA
GetPropA
SetFocus
PostMessageA
GetKeyboardType
IsWindowEnabled
ShowWindow
GetInputState
GetDlgItem
GetQueueStatus
GetCursor
GetDialogBaseUnits
CheckDlgButton
BeginPaint
GetScrollPos
GetMenuContextHelpId
GetMenuCheckMarkDimensions
IsWindowUnicode
GetMenuItemID
LoadIconA
WindowFromDC
DrawTextA
EndDialog
SetDlgItemTextA
SendMessageA
EndPaint
kernel32
SetEnvironmentVariableA
SetEndOfFile
GetTimeZoneInformation
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapSize
WriteConsoleW
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleFileNameA
RaiseException
SetStdHandle
ReadConsoleW
GetFileAttributesExW
GetFullPathNameW
CreatePipe
GetExitCodeProcess
WaitForSingleObject
SetFilePointerEx
GetStringTypeW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetProcAddress
GetModuleHandleA
QueryPerformanceCounter
GetStdHandle
GetCurrentProcess
GetVersion
WriteFile
LocalFlags
GetCurrentProcessId
LockResource
DeleteFileA
SetFilePointer
GetFileTime
GetLastError
GetTickCount
GlobalHandle
IsDebuggerPresent
FindClose
GetFileType
FlushFileBuffers
GlobalSize
FindResourceA
SizeofResource
MoveFileA
GetProcessHeap
GetCurrentThreadId
GetDriveTypeA
HeapFree
HeapAlloc
HeapReAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
DeleteCriticalSection
GetFullPathNameA
Beep
Sleep
GetTempPathA
CloseHandle
DuplicateHandle
CreateProcessA
CreateProcessW
ReadFile
SetErrorMode
GetLocalTime
GetCommandLineA
IsProcessorFeaturePresent
GetModuleFileNameW
SetLastError
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetConsoleCP
GetConsoleMode
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FindFirstFileExW
GetDriveTypeW
SetEnvironmentVariableW
Sections
.text Size: 507KB - Virtual size: 506KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE