xbpbxnxouib8mt
Static task
static1
Behavioral task
behavioral1
Sample
6764a98a38ff1f1d57845d592657be60_NeikiAnalytics.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
6764a98a38ff1f1d57845d592657be60_NeikiAnalytics.dll
Resource
win10v2004-20240226-en
General
-
Target
6764a98a38ff1f1d57845d592657be60_NeikiAnalytics.exe
-
Size
704KB
-
MD5
6764a98a38ff1f1d57845d592657be60
-
SHA1
0fdc0801f5249b262f18e36a3408207541553ccd
-
SHA256
94052e59f761a0df54310d06a06065c786abb499fcbfb75fef6f205f4e734748
-
SHA512
9077e85a2d934a0a24f0a1e6a82d87b32dce060acc227ae4b706d882ebd8a3ce0e072f2c69d8e084c1c6a7d6cbf8000406ed4865c5c501a107ed985bd8410ce4
-
SSDEEP
6144:ri05kH9OyU2uv5SRf/FWgFgtegqIRAUW9kVYeVprU4wfhTv5xD2ZP0GVGdXcukT4:+rHGPv5SmptjDmUWuVZkxikdXcq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6764a98a38ff1f1d57845d592657be60_NeikiAnalytics.exe
Files
-
6764a98a38ff1f1d57845d592657be60_NeikiAnalytics.exe.dll windows:4 windows x64 arch:x64
9a873558f9739b47d573400f9a0176b2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
mprapi
MprAdminInterfaceTransportAdd
user32
GetDoubleClickTime
kernel32
GetBinaryTypeW
SetLastError
GetCurrentThreadId
MulDiv
ExitProcess
EnumResourceTypesA
GetModuleHandleA
GetModuleFileNameW
CreateDirectoryA
GetLastError
crypt32
CryptFreeOIDFunctionAddress
winmm
midiInReset
Exports
Exports
NetApiBufferAllocate
NetApiBufferFree
NetApiBufferReallocate
NetApiBufferSize
NetRemoteComputerSupports
NetapipBufferAllocate
NetpIsComputerNameValid
NetpIsDomainNameValid
NetpIsGroupNameValid
NetpIsRemote
NetpIsRemoteNameValid
NetpIsShareNameValid
NetpIsUncComputerNameValid
NetpIsUserNameValid
NetpwListCanonicalize
NetpwListTraverse
NetpwNameCanonicalize
NetpwNameCompare
NetpwNameValidate
NetpwPathCanonicalize
NetpwPathCompare
NetpwPathType
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.code Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sbss Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.crt Size: 160KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 996B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.xlhmxa Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gnfif Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tftsir Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rqafu Size: 208KB - Virtual size: 205KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nvsbga Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kqdkib Size: 4KB - Virtual size: 571B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ohh Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.yqrp Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tcivo Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xtzqny Size: 4KB - Virtual size: 735B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ