Static task
static1
Behavioral task
behavioral1
Sample
2a955893cf860df78efb05ceeca9bf60_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2a955893cf860df78efb05ceeca9bf60_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
2a955893cf860df78efb05ceeca9bf60_NeikiAnalytics.exe
-
Size
90KB
-
MD5
2a955893cf860df78efb05ceeca9bf60
-
SHA1
5fed69581f284777745a98b1cfca1a8ec31b957a
-
SHA256
2b34e93ccf32df354549220d14ae1b6c7c584a40c492ab103a4ccd005d2c216c
-
SHA512
024572c0c04ffca4fe0696a20412db2e340b6afc57425dc4d0b942dc91baed3567b668aaaf08bd5730d638ff457d335b533a5cd75afce417854ded16892c579b
-
SSDEEP
1536:ysS+rIDEZfFz10nTQDLelSODHzDJXx7rSCryXD3QssZjoHBraYe2jh+E2fa:zrIsfVITyDODHzlhrSCCroZE7+C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2a955893cf860df78efb05ceeca9bf60_NeikiAnalytics.exe
Files
-
2a955893cf860df78efb05ceeca9bf60_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
a1477f62efa130779fcb2868cf890b42
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersion
lstrlenW
SetLocaleInfoA
GetNumberFormatA
OpenEventW
WaitForMultipleObjects
SetCalendarInfoA
lstrcmpiA
EnumTimeFormatsA
GetLocaleInfoA
FreeResource
lstrcatA
DisconnectNamedPipe
LoadLibraryA
GetCurrentDirectoryW
lstrlenA
SetPriorityClass
GetCurrentThreadId
GetSystemDirectoryW
RemoveDirectoryW
GetTempFileNameW
GetModuleFileNameA
lstrcmpA
SetComputerNameW
GetLocalTime
IsDebuggerPresent
CreateThread
GetDateFormatW
GetFileAttributesA
IsBadReadPtr
BeginUpdateResourceA
GetCalendarInfoW
GetCommandLineW
FileTimeToSystemTime
OpenSemaphoreW
MoveFileW
GetProcAddress
QueryPerformanceCounter
SuspendThread
GetACP
lstrcpynA
GetStartupInfoW
user32
DeleteMenu
DefWindowProcW
SendMessageA
DestroyCursor
GetDlgItemTextW
FillRect
GetActiveWindow
CreateDialogParamW
GetSubMenu
LoadCursorA
GetWindowLongA
GetTopWindow
wsprintfW
gdi32
GetCharABCWidthsW
CreateICA
EndPage
ExcludeClipRect
GetGlyphOutlineW
OffsetClipRgn
UpdateColors
Pie
GetObjectW
GetMetaFileBitsEx
OffsetViewportOrgEx
GetEnhMetaFileDescriptionA
InvertRgn
SetMapperFlags
GetTextExtentExPointI
CreateDCA
GetBkMode
GetEnhMetaFileA
GetCharABCWidthsA
advapi32
RegOpenKeyA
RegCreateKeyExA
RegCreateKeyExW
RegReplaceKeyW
RegSaveKeyA
shell32
DuplicateIcon
StrChrW
SHGetDiskFreeSpaceExW
SHGetDataFromIDListW
StrRChrIW
shlwapi
PathIsPrefixA
PathIsRootW
StrCmpLogicalW
SHEnumValueW
PathParseIconLocationW
PathIsUNCServerShareW
StrCmpIW
PathFindSuffixArrayA
StrStrNW
StrToIntW
wsock32
EnumProtocolsW
SetServiceW
WSAAsyncGetProtoByNumber
connect
WSAAsyncGetHostByAddr
crypt32
I_CryptFindLruEntryData
CertDeleteCTLFromStore
CertEnumCRLContextProperties
CryptDecodeMessage
CertNameToStrW
CertFindCRLInStore
CertRemoveEnhancedKeyUsageIdentifier
I_CryptCreateLruEntry
CertGetCRLFromStore
CertEnumCRLsInStore
CertNameToStrA
CertSetEnhancedKeyUsage
Sections
.T Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gF Size: 3KB - Virtual size: 408KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.HEYeA Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.uH Size: 3KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.TqqCdb Size: 3KB - Virtual size: 457KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 175KB - Virtual size: 437KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.d Size: 2KB - Virtual size: 190KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 912B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ