Behavioral task
behavioral1
Sample
ce1ce0a08f8bd04508b8922862db2170_NeikiAnalytics.exe
Resource
win7-20240611-en
General
-
Target
ce1ce0a08f8bd04508b8922862db2170_NeikiAnalytics.exe
-
Size
2.8MB
-
MD5
ce1ce0a08f8bd04508b8922862db2170
-
SHA1
b63bd3f7a8f08e1080ee8313953b71a2de5d37dd
-
SHA256
72311f397cbe2b73fbe61ea71a0bbd77bfb3fe7b6b05e3c2ada9df8a10c4bc07
-
SHA512
9578b34eab565b559407cf5b01657219f18335ed3c77c80549fe3b705f869f69464030d7b8b84537dc075043537325107489882a097e75d985df83be37200530
-
SSDEEP
49152:B3wlcMI3qf1/kJ1dGZjg+rE1EsRaGOeM4/6VA+zt:yl1YM/kJ1dgE4KRZOXtp
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ce1ce0a08f8bd04508b8922862db2170_NeikiAnalytics.exe
Files
-
ce1ce0a08f8bd04508b8922862db2170_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
8c765637048dd71e1a12b980aa64c058
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringA
GetProcAddress
FreeLibrary
GetCommandLineA
GetTempPathA
SetEndOfFile
SetCurrentDirectoryA
WriteFile
SetFilePointer
MoveFileA
DeleteFileA
WritePrivateProfileStringA
GetPrivateProfileStringA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
WideCharToMultiByte
CreateDirectoryA
CreateFileA
GetFileSize
ReadFile
FindClose
FindFirstFileA
FindNextFileA
GetStartupInfoA
CreateProcessA
WaitForSingleObject
GetLocalTime
GetModuleFileNameA
GetTickCount
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
RtlZeroMemory
VirtualFreeEx
ReadProcessMemory
VirtualAllocEx
OpenProcess
lstrcpyn
RtlMoveMemory
_lopen
MultiByteToWideChar
CloseHandle
SetWaitableTimer
CreateWaitableTimerA
LoadLibraryA
InterlockedExchange
SetStdHandle
IsBadCodePtr
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
LCMapStringW
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetACP
HeapSize
RaiseException
RtlUnwind
GetOEMCP
GetCPInfo
SetErrorMode
GetProcessVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
lstrcpynA
FlushFileBuffers
MulDiv
LocalFree
InterlockedDecrement
InterlockedIncrement
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
GetVersion
QueryPerformanceCounter
QueryPerformanceFrequency
FindResourceA
LoadResource
LockResource
lstrcatA
SetLastError
lstrlenA
lstrcpyA
Sleep
TerminateProcess
GetVersionExA
GetCurrentProcess
GetLastError
SetFileTime
LocalFileTimeToFileTime
GetCurrentDirectoryA
GetFileAttributesA
SystemTimeToFileTime
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateThread
LCMapStringW
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetACP
HeapSize
RaiseException
TerminateProcess
RtlUnwind
GetOEMCP
GetCPInfo
FlushFileBuffers
GetCurrentProcess
GetProcessVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetLastError
SetLastError
WideCharToMultiByte
InterlockedIncrement
WritePrivateProfileStringA
GlobalFlags
GetVersion
lstrlenA
lstrcpynA
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
RtlMoveMemory
LocalAlloc
RtlFillMemory
LocalFree
MultiByteToWideChar
GetModuleHandleA
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
GetStringTypeA
GetStringTypeW
IsBadCodePtr
IsBadReadPtr
CreateFileA
SetFilePointer
ReadFile
WriteFile
SetEndOfFile
GetFileSize
FindNextFileA
FindFirstFileA
FindClose
CloseHandle
CreateDirectoryA
GetCommandLineA
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
SetStdHandle
lstrcpyA
lstrcatA
SetErrorMode
InterlockedDecrement
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
GlobalUnlock
GlobalFree
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
GlobalLock
GlobalAlloc
GlobalDeleteAtom
user32
SystemParametersInfoA
GetDC
ReleaseDC
GetCursorPos
GetSystemMetrics
PeekMessageA
GetMessageA
DispatchMessageA
wsprintfA
MessageBoxA
GetMenuInfo
SetMenuInfo
GetAsyncKeyState
GetWindowThreadProcessId
CreateIconFromResource
TrackMouseEvent
SendMessageA
UpdateLayeredWindow
EnumDisplaySettingsA
MsgWaitForMultipleObjects
MessageBeep
TranslateMessage
UpdateWindow
GetClassNameA
IsWindow
ShowWindow
GetDlgItem
SetWindowLongA
SetMenuItemBitmaps
DestroyMenu
PostThreadMessageA
UnregisterClassA
LoadStringA
GetSysColorBrush
LoadCursorA
LoadIconA
MapWindowPoints
GetSysColor
AdjustWindowRectEx
GetClientRect
CopyRect
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetSubMenu
GetMenuItemID
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
IsIconic
GetWindowPlacement
SetFocus
SetWindowPos
IsDialogMessageA
SendDlgItemMessageA
GetMenuItemCount
SetWindowTextA
GetDlgCtrlID
EndDialog
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
UnhookWindowsHookEx
GrayStringA
DrawTextA
TabbedTextOutA
ClientToScreen
RegisterClipboardFormatA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
GetWindowRect
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
IsWindowEnabled
EnableWindow
SetCursor
PostMessageA
PostQuitMessage
GetParent
GetWindow
PtInRect
IsWindowVisible
GetWindowLongA
GetWindowTextA
SetWindowLongA
GetDlgItem
GetCapture
SetFocus
GetSystemMetrics
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
GetWindowTextA
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
UnregisterClassA
UnhookWindowsHookEx
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
SetWindowPos
SetMenuItemBitmaps
GetWindowPlacement
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
SetCursor
SendMessageA
PostMessageA
PostQuitMessage
MessageBoxA
wsprintfA
DispatchMessageA
ModifyMenuA
LoadCursorA
LoadIconA
MapWindowPoints
GetSysColor
TranslateMessage
GetMessageA
PeekMessageA
AdjustWindowRectEx
GetClientRect
CopyRect
GetTopWindow
DestroyMenu
LoadStringA
GetSysColorBrush
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
ShowWindow
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
WinHelpA
RegisterClassA
CheckMenuItem
GetClassInfoA
shell32
DragQueryFileA
Shell_NotifyIconA
SHGetSpecialFolderPathA
SHFileOperationA
DragAcceptFiles
DragFinish
ShellExecuteA
SHGetSpecialFolderPathA
gdi32
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
GetDeviceCaps
SelectObject
DeleteDC
GetObjectA
GetStockObject
DeleteObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
SelectObject
RestoreDC
SaveDC
DeleteDC
ScaleWindowExtEx
SetBkColor
GetStockObject
GetObjectA
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
Escape
ExtTextOutA
TextOutA
RectVisible
CreateBitmap
GetClipBox
SetWindowExtEx
PtVisible
DeleteObject
GetDeviceCaps
advapi32
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
ws2_32
recv
send
getpeername
ntohs
connect
select
__WSAFDIsSet
accept
socket
htons
bind
WSAStartup
inet_ntoa
WSACleanup
gethostbyname
closesocket
inet_addr
getsockname
gethostname
sendto
listen
recvfrom
htonl
shlwapi
StrToInt64ExA
PathFileExistsA
winmm
timeKillEvent
timeSetEvent
comdlg32
GetOpenFileNameA
GetSaveFileNameA
ole32
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
OleRun
CreateStreamOnHGlobal
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
wininet
InternetReadFile
HttpSendRequestA
InternetSetOptionA
HttpQueryInfoA
InternetCloseHandle
InternetConnectA
InternetOpenA
InternetGetConnectedState
InternetOpenUrlA
HttpOpenRequestA
atl
ord42
ord47
gdiplus
GdipDrawRectangle
GdipLoadImageFromStream
GdipDeletePen
GdipDrawRectangleI
GdipSetSmoothingMode
GdipSetTextRenderingHint
GdipCreateSolidFill
GdipDeleteBrush
GdiplusStartup
GdipGetImageGraphicsContext
GdipCreateBitmapFromStream
msimg32
AlphaBlend
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comctl32
ord17
ord17
oledlg
ord8
oleaut32
SysAllocString
SafeArrayCreate
VariantClear
RegisterTypeLi
SafeArrayDestroy
LHashValOfNameSys
LoadTypeLi
VarR8FromBool
VarR8FromCy
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 268KB - Virtual size: 394KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE