DoWork
Behavioral task
behavioral1
Sample
2b3b40fb486c79c2679b24aa6d14b200_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2b3b40fb486c79c2679b24aa6d14b200_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
2b3b40fb486c79c2679b24aa6d14b200_NeikiAnalytics.exe
-
Size
1.5MB
-
MD5
2b3b40fb486c79c2679b24aa6d14b200
-
SHA1
b5c3a03196c954bab3f2295c617b3da40555dc2e
-
SHA256
ae8048481af2348e95513b76fd7cf5d2190fe5ce15f06d34a3e90f7bcc3d9b12
-
SHA512
ecbda60d7e6eac5711bfa5426ff6974d66e214b9ee0fcccdaf3636817bf3c2263878daac7baca63b79354095e8d57ea6726bc0a11798d8aede05656955205301
-
SSDEEP
24576:mETyOqZEh/IoGqpsz+FHjV0MR1CkGUsqnMstM09dHqVwpy6EKPim1y9hGxL/bpab:mkKyhHDsz+xR0MRCU9xtMsHqgEKPimop
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2b3b40fb486c79c2679b24aa6d14b200_NeikiAnalytics.exe
Files
-
2b3b40fb486c79c2679b24aa6d14b200_NeikiAnalytics.exe.dll windows:5 windows x86 arch:x86
a2a7020dc017c89a228762d070896239
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
wsprintfA
ExitWindowsEx
wsprintfW
FindWindowA
MessageBoxA
CharUpperBuffW
MessageBoxW
psapi
GetModuleFileNameExA
shlwapi
PathFileExistsA
shell32
SHGetFolderPathA
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
CloseServiceHandle
QueryServiceConfigW
OpenServiceW
EnumServicesStatusExW
OpenSCManagerW
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
kernel32
FlushFileBuffers
SetStdHandle
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSectionAndSpinCount
SetEndOfFile
GetProcessHeap
WriteConsoleW
LocalAlloc
TerminateProcess
CloseHandle
CreateThread
CreateFileA
GetFileSize
CreateMutexW
FindResourceA
GetNativeSystemInfo
MoveFileExA
LoadResource
GetCurrentProcess
Process32First
GetTickCount
GetWindowsDirectoryA
VirtualQueryEx
WriteFile
OpenProcess
Sleep
SizeofResource
ReadProcessMemory
LeaveCriticalSection
ReadFile
GetSystemDirectoryA
CreateFileW
MultiByteToWideChar
Module32First
GetLastError
GetProcAddress
CopyFileA
EnterCriticalSection
GetLocalTime
LoadLibraryA
Process32Next
DeviceIoControl
GetModuleFileNameA
GetModuleHandleA
CreateToolhelp32Snapshot
GetCurrentThreadId
Module32Next
GetCurrentProcessId
GetTempPathA
DeleteFileA
WaitForSingleObject
CreateMutexA
ReleaseMutex
LocalFree
MoveFileA
GetSystemTimeAsFileTime
GetCommandLineA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
RaiseException
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
RtlUnwind
HeapFree
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
ExitProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
HeapSize
VirtualAlloc
HeapReAlloc
SetFilePointer
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetCurrentProcess
FreeLibrary
TerminateProcess
GetSystemInfo
CreateToolhelp32Snapshot
Thread32First
GetCurrentThreadId
OpenThread
Thread32Next
CloseHandle
SuspendThread
ResumeThread
WriteProcessMemory
VirtualAlloc
VirtualProtect
VirtualFree
GetProcessAffinityMask
SetProcessAffinityMask
GetCurrentThread
SetThreadAffinityMask
Sleep
GetTickCount
GetLocalTime
GlobalFree
GetProcAddress
LocalAlloc
LoadLibraryA
ExitProcess
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleW
LoadResource
MultiByteToWideChar
FindResourceExW
FindResourceExA
WideCharToMultiByte
GetThreadLocale
GetUserDefaultLCID
GetSystemDefaultLCID
EnumResourceNamesA
EnumResourceNamesW
EnumResourceLanguagesA
EnumResourceLanguagesW
EnumResourceTypesA
EnumResourceTypesW
CreateFileW
LoadLibraryW
FlushFileBuffers
GetCurrentProcessId
GetLastError
GetModuleFileNameW
CreateEventA
GetModuleHandleA
GetSystemTimeAsFileTime
VirtualQuery
LocalFree
CreateFileA
ReadFile
GetCommandLineA
RaiseException
RtlUnwind
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
HeapReAlloc
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
WriteFile
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
wtsapi32
WTSSendMessageW
Exports
Exports
Sections
.text Size: - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 288B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ