Static task
static1
Behavioral task
behavioral1
Sample
371def51f03d2d6e58c3a1084eacbb00_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
371def51f03d2d6e58c3a1084eacbb00_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
371def51f03d2d6e58c3a1084eacbb00_NeikiAnalytics.exe
-
Size
80KB
-
MD5
371def51f03d2d6e58c3a1084eacbb00
-
SHA1
60d0abc08f6fe469352d1649f7d6b0aaca32484b
-
SHA256
2e8319923a0595834109325547002add4d6460e951aee4aac2c13e00acb6a0df
-
SHA512
0133cbfdd82437c80c98c585560b219df51b5f44cb8123f887f31be8a764eee0ac35439b9bedc4075e5e2ce1b1a5918dba4cfcc847c10836d7cfb9c96565dc63
-
SSDEEP
1536:SZvCFxGFZlhBHCju2Pz2pAHgXHN0qjscbut:SFlhBHCju2PToN0qj5u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 371def51f03d2d6e58c3a1084eacbb00_NeikiAnalytics.exe
Files
-
371def51f03d2d6e58c3a1084eacbb00_NeikiAnalytics.exe.exe windows:1 windows x86 arch:x86
e7b474d5235df88a5109bb7014b05cd6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
c55ascx
ASCII
c55runx
Cla$ACCEPTED
Cla$ADDqueue
Cla$ADDqueuekey
Cla$ALIAS
Cla$AssignRefUfo
Cla$BEEP
Cla$CLEAR
Cla$clearstr
Cla$CLOCK
Cla$CLOSEwindow
Cla$code
Cla$COMMAND
Cla$comparestr
Cla$DDEclient
Cla$DDEexecute
Cla$DecDistinct
Cla$DecDistinctR
Cla$DELETEqueue
Cla$DISPLAY
Cla$DISPOSEqueue
Cla$DISPOSEref
Cla$Dlongpower
Cla$DoProp
Cla$DPopLong
Cla$DPushLong
Cla$EndEventLoop
Cla$ERRCODE
Cla$EVENT
Cla$FIELD
Cla$FILEERRORCODE
Cla$FILEERRORMSG
Cla$FileExists
Cla$FILE_ADDf
Cla$FILE_BUILDf
Cla$FILE_CREATE
CLA$FILE_DESTROY
Cla$FILE_GETNULLS
CLA$FILE_GETSTATE
Cla$FILE_GET_PROPERTY
Cla$FILE_NAME
Cla$FILE_OPEN
Cla$FILE_POSITIONf
Cla$FILE_POSITIONk
Cla$FILE_REGETf
Cla$FILE_REGETk
Cla$FILE_SEND
Cla$FILE_SETNULLS
Cla$FILE_SET_PROPERTY
Cla$FOCUS
Cla$FREEqueue
Cla$FREEqueuea
Cla$freestr
Cla$FreeUfo
Cla$freewindow
Cla$GETINI
Cla$GetPropS
Cla$GETqueuekey
Cla$GETqueueptr
Cla$HALT
Cla$init
Cla$KEYCODE
Cla$Locale
Cla$longtostr
Cla$Mem2Ufo
Cla$MessageBox
Cla$NewMemB
Cla$NewMemT
Cla$NEWqueue
Cla$OPENwindow
Cla$POINTERqueue
Cla$PopAString
Cla$PopBind
Cla$PopCString
Cla$PopString
Cla$PopTemp
Cla$POST
Cla$PushAString
Cla$PushBind2
Cla$PushCString
Cla$PushLong
Cla$PushPictLong
Cla$PushString
Cla$PushUfo
Cla$PUTINI
Cla$PUTqueue
Cla$pwopen
Cla$RECORDSqueue
Cla$RefAssignAny
Cla$RUN
Cla$SELECT
Cla$SETCURSOR
Cla$SETKEYCODE
Cla$SetPropS
Cla$SetPropV
Cla$SORTqueuekey
Cla$Stack2DStack
Cla$Stack2Ufo
Cla$StackCLIP
Cla$StackCompareN
Cla$StackCompareNEQ
Cla$StackCompareR
Cla$StackConcat
Cla$StackConcatR
Cla$StackErrstr
Cla$StackHeap
Cla$StackINSTRING
Cla$StackLen
Cla$STACKpop
Cla$StackRotate
Cla$StackSUB
Cla$StackUPPER
Cla$StartEventLoop
Cla$StashBP
Cla$storecstr
Cla$storestr
Cla$THREAD
Cla$TODAY
Cla$UNHIDE
Cla$UNREGISTEREVENT
Cla$WHAT
Cla$YIELD
Wsl$CloseDown
_exit
_free
_longjmp
_malloc
_memset
_setjmp
__checkversion
__sysinit
user32
SystemParametersInfoA
Sections
.text Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ