Static task
static1
Behavioral task
behavioral1
Sample
e2df1cbd6831c5bf1a2fc7e5b718a950_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e2df1cbd6831c5bf1a2fc7e5b718a950_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
e2df1cbd6831c5bf1a2fc7e5b718a950_NeikiAnalytics.exe
-
Size
2.1MB
-
MD5
e2df1cbd6831c5bf1a2fc7e5b718a950
-
SHA1
3209762d0baef8a057e30187ad8b93b186b98646
-
SHA256
36e7e1c7e1b9f298fb8658c6289788f3263e6fc17512d6dc8bf98586d6e6aadb
-
SHA512
121d227d04d56567bb45e5fc4679000f4cdda7d6235ed97fc60b29aa0cb9ea056568a2134e1e04a135ef9ac1dbb2f68e1e1ab11ca3a29c87f1dc882a580dc258
-
SSDEEP
49152:OcmVs3tOPOQZC3xLhS6w8qbCjXJYK3yI66MFZiOQ5Z:NSs3tNqClhS6wuOeyIwFVq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e2df1cbd6831c5bf1a2fc7e5b718a950_NeikiAnalytics.exe
Files
-
e2df1cbd6831c5bf1a2fc7e5b718a950_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
081698da2b31ca473f60632a23aa1a2a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCurrentDirectoryA
CloseHandle
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
CreateFileA
RemoveDirectoryA
SetFileAttributesA
GetFileAttributesA
GetModuleFileNameA
SetEndOfFile
FlushFileBuffers
SetStdHandle
LoadLibraryA
GetProcAddress
FindFirstFileA
GetCurrentDirectoryA
GetStringTypeW
GetStringTypeA
SetFilePointer
ReadFile
LCMapStringW
LCMapStringA
MultiByteToWideChar
WriteFile
RtlUnwind
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
GetCurrentProcess
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
DeleteFileA
FindNextFileA
FindClose
_lcreat
_lopen
_lread
_llseek
_lclose
CreateDirectoryA
CompareStringW
CompareStringA
GetCurrentThreadId
_lwrite
HeapCreate
VirtualFree
WideCharToMultiByte
HeapFree
HeapAlloc
GetLastError
SetEnvironmentVariableA
GetFullPathNameA
GetDriveTypeA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
MoveFileA
HeapDestroy
InterlockedIncrement
TerminateProcess
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
InterlockedDecrement
user32
CreateWindowExA
GetDialogBaseUnits
LoadIconA
LoadCursorA
RegisterClassA
MoveWindow
ShowWindow
GetUpdateRect
BeginPaint
EndPaint
PostQuitMessage
DefWindowProcA
SetWindowTextA
InvalidateRect
SetWindowLongA
GetMessageA
GetWindowTextA
DrawEdge
GetSysColor
DestroyWindow
SendMessageA
PeekMessageA
DispatchMessageA
TranslateMessage
GetDlgItem
SetFocus
DialogBoxParamA
EndDialog
SendDlgItemMessageA
wsprintfA
MessageBoxA
GetWindowRect
GetSystemMetrics
SetWindowPos
GetClientRect
GetDC
FillRect
ReleaseDC
OemToCharA
gdi32
CreateCompatibleDC
GetDeviceCaps
DeleteDC
SelectObject
CreateFontA
SetBkColor
GetTextExtentPoint32A
SetTextColor
CreateSolidBrush
DeleteObject
TextOutA
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ