Static task
static1
Behavioral task
behavioral1
Sample
ce06fb42f6ce2eb3dd38c2dd23e6d430_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ce06fb42f6ce2eb3dd38c2dd23e6d430_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
ce06fb42f6ce2eb3dd38c2dd23e6d430_NeikiAnalytics.exe
-
Size
144KB
-
MD5
ce06fb42f6ce2eb3dd38c2dd23e6d430
-
SHA1
8435ccb6b1e924096fa4a86dea4f29a108b12ce8
-
SHA256
b5a2a891a3fe6c82a922bea1354d0458efe731537946bf7d8ceb08bc9aa3b8f2
-
SHA512
027126d1e7b9fa80a6506cdaa00ae628dd31b2b59e06cdba4d32ffd0bb61f3e1b3bc1aaf69842533cc2d63c6c3827d4944dad9d305427e10c4184f0f9134a1c5
-
SSDEEP
3072:7O55T4GISTnDPj4Ep1R6vwtqLqL6gzNN9+qyN22TXm:aT4FSTnK48q7zdyN2u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ce06fb42f6ce2eb3dd38c2dd23e6d430_NeikiAnalytics.exe
Files
-
ce06fb42f6ce2eb3dd38c2dd23e6d430_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
8f8eded23cc47d0ce97247f230180748
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord2725
ord4698
ord5307
ord5289
ord5714
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord825
ord815
ord641
ord2514
ord2621
ord1134
ord3663
ord800
ord2801
ord1259
ord2740
ord5265
ord4376
ord4853
ord4998
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord4627
ord4425
ord3597
ord1146
ord5302
ord4079
ord2302
ord4234
ord4710
ord2379
ord755
ord470
ord823
ord2688
ord1572
ord465
ord539
ord537
ord540
ord858
ord2919
ord941
ord939
ord6571
ord1871
ord5651
ord3613
ord1265
ord349
ord3126
ord3130
ord3676
ord4673
ord922
ord5572
ord6055
ord1776
ord5290
ord3402
ord6241
ord2463
ord2135
ord4034
ord1949
ord1268
ord861
ord3742
ord567
ord818
ord1271
ord2396
ord5300
ord3346
ord3922
ord5199
ord1089
ord2554
ord5731
ord2512
ord4274
ord4486
ord6375
ord1168
ord324
ord350
ord2393
ord4278
ord6662
ord1576
msvcrt
_onexit
__dllonexit
??1type_info@@UAE@XZ
_except_handler3
_exit
_XcptFilter
exit
?terminate@@YAXXZ
__getmainargs
_acmdln
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_initterm
exp
sqrt
memcpy
swscanf
fabs
qsort
pow
__CxxFrameHandler
_ftol
sprintf
atol
_CxxThrowException
memmove
_setmbcp
cos
sin
log10
log
atan2
_purecall
memset
_mbsnbcpy
__RTDynamicCast
malloc
free
floor
kernel32
CloseHandle
LocalFree
CreateMutexA
GetLastError
FormatMessageA
GetModuleHandleA
GetStartupInfoA
GetCurrentThreadId
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
user32
SetWindowLongA
EnableWindow
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageA
LoadIconA
IsIconic
CallWindowProcA
oleaut32
SysFreeString
SafeArrayAccessData
SafeArrayUnaccessData
VariantInit
VariantClear
SafeArrayLock
SafeArrayUnlock
SafeArrayCreate
GetErrorInfo
msvcp60
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
ole32
CoCreateInstance
OleRun
olepro32
ord254
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ