Static task
static1
Behavioral task
behavioral1
Sample
23a978f743fe6dcff22a68374a5f8d00_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
23a978f743fe6dcff22a68374a5f8d00_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
23a978f743fe6dcff22a68374a5f8d00_NeikiAnalytics.exe
-
Size
212KB
-
MD5
23a978f743fe6dcff22a68374a5f8d00
-
SHA1
85ef375d2e21bbb5ed3351342425b11fe7147b5b
-
SHA256
e25ba7e2589debc089654111ff30e23c521e07f55e7ec0d001b3ae3e437b441a
-
SHA512
13ed9f05f1482997fd4d73e79a57eab7f85a991c90e5078436c4dad45b273c9b11192be6f5c53dab19a6bd98cd5009e7608ddfd05344cb3195560db7d64bb338
-
SSDEEP
6144:qob34ERMS/H7YAVsobrVn5G4E3Hi96mbQzJWFO8Omw4G:NboEj/8ASWM4Ki96/zqIKG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 23a978f743fe6dcff22a68374a5f8d00_NeikiAnalytics.exe
Files
-
23a978f743fe6dcff22a68374a5f8d00_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
5e539ac4c687c5ce6caaaf37a79a53af
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SleepEx
FindResourceA
RemoveDirectoryA
GetModuleFileNameA
RemoveDirectoryW
AddAtomA
GetFileAttributesA
CreateDirectoryA
IsBadWritePtr
GetNumberFormatA
GetProcAddress
SetComputerNameW
OpenMutexA
DeleteAtom
GetSystemDefaultLCID
GetModuleHandleA
lstrcpyA
user32
CheckMenuRadioItem
CreateAcceleratorTableA
GetDC
GetMessageW
InvalidateRgn
DialogBoxIndirectParamA
GetClassNameW
SetWindowTextA
IsWindowEnabled
wsprintfA
GetKeyState
DefWindowProcW
UpdateWindow
ActivateKeyboardLayout
DialogBoxParamA
ClientToScreen
CallWindowProcA
AdjustWindowRect
AppendMenuA
UpdateWindow
wvsprintfW
LoadMenuIndirectA
GetClassNameA
UnregisterClassA
SendMessageW
EndDialog
LoadImageW
GetWindowRgn
InvalidateRect
IsMenu
TrackPopupMenu
SendDlgItemMessageA
SetCursorPos
LoadImageA
LoadIconA
CreateWindowExA
SetCursor
BringWindowToTop
LoadBitmapW
RegisterWindowMessageA
DefWindowProcA
DefDlgProcW
GetWindowRect
SetDlgItemTextW
PeekMessageW
GetTopWindow
GetActiveWindow
DrawTextW
MessageBoxIndirectA
SetTimer
gdi32
SetPaletteEntries
PlayMetaFile
CreateFontIndirectExA
GetTextFaceA
GetCharWidth32W
AnimatePalette
GetTextMetricsA
SetArcDirection
RemoveFontResourceExW
CopyEnhMetaFileA
GetTextCharsetInfo
GetDCPenColor
GetBrushOrgEx
Polygon
advapi32
RegQueryInfoKeyA
RegSaveKeyA
RegRestoreKeyW
RegCreateKeyExW
RegDeleteValueA
RegReplaceKeyW
RegOpenKeyA
RegFlushKey
RegOpenKeyW
shlwapi
StrCSpnW
PathCommonPrefixW
PathRemoveExtensionW
StrCmpNIW
PathRemoveFileSpecW
PathIsFileSpecW
PathFindExtensionW
comdlg32
PrintDlgExA
ChooseFontA
GetOpenFileNameA
GetOpenFileNameW
oleaut32
LoadTypeLib
VarR8FromDisp
VarR4FromUI1
setupapi
SetupDefaultQueueCallbackW
ws2_32
gethostname
WSACleanup
urlmon
IsAsyncMoniker
CoGetClassObjectFromURL
crypt32
PFXIsPFXBlob
CertSerializeCTLStoreElement
CryptEnumKeyIdentifierProperties
I_CryptAddRefLruEntry
RegCreateHKCUKeyExU
CryptVerifyDetachedMessageSignature
RegEnumValueU
CryptMsgCountersign
CreateFileU
CertFreeCertificateChainEngine
CertCreateCRLContext
I_CertSyncStore
CryptFormatObject
CertCreateSelfSignCertificate
CertAddEncodedCRLToStore
Sections
.bzhvQQ Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.Fj Size: 512B - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ooKm Size: 4KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.BdD Size: 5KB - Virtual size: 430KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 120KB - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.WGGRl Size: 4KB - Virtual size: 262KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.DAv Size: 2KB - Virtual size: 398KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 764B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ