Static task
static1
Behavioral task
behavioral1
Sample
41fab6b80d438b9f7c3823f295fb6cb0_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
41fab6b80d438b9f7c3823f295fb6cb0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
41fab6b80d438b9f7c3823f295fb6cb0_NeikiAnalytics.exe
-
Size
6.2MB
-
MD5
41fab6b80d438b9f7c3823f295fb6cb0
-
SHA1
bf8f4c36e9eaa932ea48deffdcefb7fea23ec15b
-
SHA256
8879284a113776e5a56b2061670a3573ef9dfd8d8a1fd32bdcd1d9d752b15ccd
-
SHA512
6ebda20e5e6d6325bdef3519fc884f3addefd5216065273bd3e815ab124c0ba2a75ad00847a30e20bdbc673f429f0f636dd4dac80f0d4dec4d006b9326c2f47b
-
SSDEEP
196608:RbaBceqN3cmOtXG9kTmD7YQelehZMNja333m333q0t33333323333L:RO43cmOtXG9kTmD7YQeleca333m333pE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41fab6b80d438b9f7c3823f295fb6cb0_NeikiAnalytics.exe
Files
-
41fab6b80d438b9f7c3823f295fb6cb0_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
2f9b0bccb427997247c7f04e2f555607
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
CryptDestroyHash
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegOpenKeyA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegDeleteValueA
RegCreateKeyA
CryptReleaseContext
CryptDestroyKey
CryptEncrypt
CryptImportKey
CryptVerifySignatureA
CryptAcquireContextA
GetUserNameA
RegCreateKeyExA
CryptGetHashParam
CryptDeriveKey
CryptCreateHash
CryptHashData
RegEnumValueA
dinput8
DirectInput8Create
dsound
ord1
gdi32
GetStockObject
CreateDIBSection
ExtTextOutW
DeleteObject
DeleteDC
CreateCompatibleDC
GetTextExtentPoint32A
SetTextAlign
SetTextColor
SetMapMode
SetBkColor
CreateFontA
SelectObject
imm32
ImmGetContext
ImmAssociateContext
ImmNotifyIME
ImmSetCandidateWindow
ImmGetCandidateListW
ImmSetConversionStatus
ImmGetConversionStatus
ImmGetOpenStatus
ImmGetCompositionStringW
ImmGetDescriptionW
ImmReleaseContext
ImmSetOpenStatus
ImmGetDefaultIMEWnd
ImmDisableIME
ImmIsIME
ImmSetCompositionWindow
kernel32
PeekNamedPipe
CreatePipe
DuplicateHandle
GetTempPathA
GetTempFileNameA
LoadLibraryExA
OpenFileMappingA
lstrcpyA
InterlockedIncrement
GetModuleFileNameW
GetSystemDirectoryA
lstrcmpA
lstrlenA
InterlockedDecrement
CreateEventA
WaitForSingleObject
GetProcAddress
LoadLibraryA
FreeLibrary
GetFileSize
ReadFile
CloseHandle
CreateFileA
SetCurrentDirectoryA
SetFileAttributesA
GetFileAttributesA
GetComputerNameA
ReleaseMutex
TerminateThread
lstrcatA
MoveFileExA
CopyFileA
ExitProcess
QueryPerformanceCounter
Sleep
CreateMutexA
GetLastError
QueryPerformanceFrequency
GetTickCount
GetLocalTime
OutputDebugStringA
HeapAlloc
HeapDestroy
HeapCreate
SleepEx
SetFilePointer
FindNextFileA
FindFirstFileA
FindClose
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
WriteFile
RtlUnwind
MultiByteToWideChar
GetDriveTypeA
GetCurrentDirectoryA
GetFullPathNameA
WideCharToMultiByte
HeapFree
FileTimeToSystemTime
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
GetModuleFileNameA
GetModuleHandleA
TerminateProcess
GetCurrentProcess
DeleteFileA
MoveFileA
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitThread
GetCurrentThreadId
CreateThread
SetEnvironmentVariableA
CreateDirectoryA
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
HeapSize
SetStdHandle
GetFileType
GetTimeZoneInformation
SetHandleCount
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
VirtualProtect
GetSystemInfo
VirtualQuery
InterlockedExchange
GetTimeFormatA
GetDateFormatA
FlushFileBuffers
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetACP
GetOEMCP
GetCPInfo
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetCurrentProcessId
CreateFileW
SetEndOfFile
GetLocaleInfoW
CompareStringA
CompareStringW
SetEvent
WaitForMultipleObjects
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
IsProcessorFeaturePresent
GetProcessHeap
ResumeThread
ResetEvent
SetThreadPriority
GetExitCodeProcess
CreateProcessA
OpenEventA
OpenMutexA
shell32
ShellExecuteA
user32
GetClientRect
ScreenToClient
GetCursorPos
ShowCursor
OffsetRect
IntersectRect
ClientToScreen
SetCursorPos
MessageBoxA
wsprintfA
MessageBoxW
PeekMessageA
DispatchMessageA
TranslateMessage
GetWindow
SetCursor
MoveWindow
DefWindowProcA
SendMessageA
GetWindowRect
GetSystemMetrics
LoadCursorA
LoadIconA
SetActiveWindow
UpdateWindow
ShowWindow
CreateWindowExA
RegisterClassA
GetWindowThreadProcessId
AttachThreadInput
SetWindowLongA
CallWindowProcA
GetKeyboardLayout
GetWindowLongA
winmm
timeEndPeriod
timeGetTime
timeBeginPeriod
ws2_32
WSASend
wsock32
WSAGetLastError
__WSAFDIsSet
htons
send
connect
socket
closesocket
shutdown
sendto
WSAStartup
gethostbyname
recvfrom
gethostbyaddr
ioctlsocket
setsockopt
recv
WSACleanup
getsockopt
select
d3d8
Direct3DCreate8
snmpapi
SnmpUtilVarBindFree
SnmpUtilOidNCmp
SnmpUtilOidCpy
Sections
.text Size: 4.8MB - Virtual size: 4.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 175KB - Virtual size: 856KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 610KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 348KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 70KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pseudo Size: 261KB - Virtual size: 264KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE