Static task
static1
Behavioral task
behavioral1
Sample
2f894af150705ea9546c5c56a501d53f0392c172ee6929dada6f0077dd4d359b_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2f894af150705ea9546c5c56a501d53f0392c172ee6929dada6f0077dd4d359b_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
2f894af150705ea9546c5c56a501d53f0392c172ee6929dada6f0077dd4d359b_NeikiAnalytics.exe
-
Size
104KB
-
MD5
040d6d37f2dbe68fe4f66d74aba0a0a0
-
SHA1
e7592c20ab95636d4d34fe950f47a3d05c5f2827
-
SHA256
2f894af150705ea9546c5c56a501d53f0392c172ee6929dada6f0077dd4d359b
-
SHA512
afc3456d7bfedc7a90e359279af858e4190552154d317a4da5b3da706d5a1dbd9dc2b8b0a48cdf646e6f49cd34b64f3625322f6a159f9e65064545dea28e77fa
-
SSDEEP
1536:tSQxAH63tt+jBBETbY7CTGpJYBpIlQ5MO6RLIf8FoBoRHqt:tSQxAWtG/EAfspGYMLegooKt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2f894af150705ea9546c5c56a501d53f0392c172ee6929dada6f0077dd4d359b_NeikiAnalytics.exe
Files
-
2f894af150705ea9546c5c56a501d53f0392c172ee6929dada6f0077dd4d359b_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
d739b0b18ec278b61379254bef058cc1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
w3scmv7
ord60
ord62
ord54
ord58
ord88
ord96
ord90
pscore2
_PSComFlushFactoryCache@0
kernel32
GetLastError
FreeConsole
Sleep
SetConsoleScreenBufferSize
GetConsoleScreenBufferInfo
GetStdHandle
SetConsoleCtrlHandler
AllocConsole
ReleaseSemaphore
CreateMutexA
CloseHandle
WaitForSingleObject
ReleaseMutex
CreateEventA
SetEvent
CreateSemaphoreA
OpenSemaphoreA
SearchPathA
LoadLibraryA
FreeLibrary
GetProcAddress
OpenFileMappingA
TerminateThread
GetModuleHandleA
GetCurrentProcessId
GetVersion
LocalFree
lstrlenA
lstrcmpA
LocalAlloc
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SetStdHandle
GetFileType
EnterCriticalSection
LeaveCriticalSection
ReadFile
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
FlushFileBuffers
InterlockedIncrement
InterlockedDecrement
SetFilePointer
GetOEMCP
GetACP
GetCPInfo
FindClose
FindFirstFileA
FindNextFileA
CreateFileA
HeapReAlloc
VirtualAlloc
WriteFile
RtlUnwind
VirtualFree
HeapCreate
GetModuleFileNameA
GetEnvironmentVariableA
GetCommandLineA
ExitProcess
HeapFree
HeapAlloc
ResumeThread
CreateThread
TlsSetValue
ExitThread
PeekConsoleInputA
GetNumberOfConsoleInputEvents
HeapDestroy
GetVersionExA
InitializeCriticalSection
TlsGetValue
GetEnvironmentStringsW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
GetCurrentThreadId
TlsAlloc
SetLastError
user32
SetActiveWindow
GetForegroundWindow
MessageBoxA
GetWindowRect
GetDC
ReleaseDC
SetWindowPos
LoadMenuA
GetSubMenu
SetMenuDefaultItem
GetCursorPos
TrackPopupMenu
PostMessageA
DestroyMenu
LoadImageA
PostQuitMessage
DefWindowProcA
SetWindowTextA
SetDlgItemTextA
CreateDialogParamA
ShowWindow
UpdateWindow
SetForegroundWindow
GetMessageA
DispatchMessageA
IsDialogMessageA
TranslateMessage
LoadStringA
SendMessageA
gdi32
GetDeviceCaps
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
shell32
Shell_NotifyIconA
Sections
.text Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ