Static task
static1
Behavioral task
behavioral1
Sample
c734231645ccf967f6cf1a93f6c2be60_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c734231645ccf967f6cf1a93f6c2be60_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
c734231645ccf967f6cf1a93f6c2be60_NeikiAnalytics.exe
-
Size
80KB
-
MD5
c734231645ccf967f6cf1a93f6c2be60
-
SHA1
692e232b99f2b68598e02356996e5e5b621e5e05
-
SHA256
a9be974617af15850d01b654ec8ac8310ec59f882ba5b5465992c22a9df1f2dd
-
SHA512
1582f32afe3d83db44bdebcf190e8606d1a0763b1606bdd8fb65e650576015a9dfa490e0139f88660468c0e4d534b72ae82473207aa9d354db7c9ea88260e861
-
SSDEEP
1536:8hJe54bD2BPZOLRkY2Zq+zbnBo2BOzOM6LYyQQIS9jU29:CJfRnsJLYyXIS9Q29
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c734231645ccf967f6cf1a93f6c2be60_NeikiAnalytics.exe
Files
-
c734231645ccf967f6cf1a93f6c2be60_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
bbf5919084b1322cb6e4b625fdff90b3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4425
ord3597
ord324
ord825
ord641
ord4234
ord1816
ord2582
ord6055
ord1776
ord4402
ord5290
ord3370
ord4424
ord3640
ord693
ord860
ord1146
ord1168
ord567
ord540
ord2302
ord5953
ord4160
ord2863
ord2379
ord755
ord470
ord6215
ord6334
ord858
ord3452
ord823
ord5575
ord2141
ord542
ord4224
ord2818
ord922
ord4129
ord2814
ord3810
ord1105
ord613
ord5789
ord2860
ord289
ord3998
ord2652
ord861
ord1669
ord5601
ord1799
ord614
ord1206
ord2623
ord290
ord1223
ord4622
ord4226
ord2486
ord4003
ord446
ord743
ord1200
ord1834
ord5067
ord4635
ord4607
ord4716
ord4750
ord4608
ord5016
ord4375
ord4852
ord4834
ord355
ord4229
ord2515
ord535
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord3738
ord561
ord815
ord1226
ord6467
ord5500
ord6354
ord5716
ord3081
ord2621
ord1199
ord1205
ord6199
ord5609
ord2393
ord5711
ord623
ord634
ord2021
ord1973
ord5180
ord3430
ord316
ord2016
ord2716
ord1667
ord1761
ord5174
ord304
ord348
ord663
ord434
ord2614
ord1980
ord3319
ord2781
ord668
ord2770
ord356
ord924
ord1975
ord845
ord3164
ord1572
ord629
ord3550
ord5176
ord310
ord1567
ord268
ord3663
ord3790
ord5572
ord2919
ord5710
ord2763
ord1085
ord5583
ord5683
ord1086
ord6569
ord4033
ord1176
ord1243
ord1578
ord600
ord826
ord269
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5280
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord2514
ord4710
ord4998
ord4853
ord4376
ord5265
ord800
ord5717
ord537
ord1576
msvcrt
__dllonexit
_setmbcp
__CxxFrameHandler
_ftol
sprintf
_splitpath
_stricmp
_snprintf
_onexit
_mbscmp
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
kernel32
FindNextFileA
SetErrorMode
RemoveDirectoryA
LocalFree
LocalAlloc
GetModuleHandleA
GetStartupInfoA
Sleep
SetEvent
lstrlenA
WaitForSingleObject
GetFileAttributesA
FindClose
FindFirstFileA
user32
GetClientRect
PostMessageA
EnableWindow
IsIconic
GetSystemMetrics
MessageBoxA
DrawIcon
GetSystemMenu
AppendMenuA
SendMessageA
GetWindowRect
LoadIconA
gdi32
GetTextExtentPoint32A
advapi32
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
shell32
SHFileOperationA
ole32
CLSIDFromProgID
oleaut32
VariantClear
SysAllocStringLen
SysFreeString
Sections
.text Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ