Static task
static1
Behavioral task
behavioral1
Sample
617e634e9975b34f7cffcb18f36c912147fd5fd0e090bf398bf831cc734e85e1_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
617e634e9975b34f7cffcb18f36c912147fd5fd0e090bf398bf831cc734e85e1_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
617e634e9975b34f7cffcb18f36c912147fd5fd0e090bf398bf831cc734e85e1_NeikiAnalytics.exe
-
Size
2.2MB
-
MD5
98da83645c9a729f666f2cb9a643d7d0
-
SHA1
4b68e278effadf17e39c8a6801da5fa28bc3b222
-
SHA256
617e634e9975b34f7cffcb18f36c912147fd5fd0e090bf398bf831cc734e85e1
-
SHA512
e596a84d815e0b0a7a1af5428bc7cbfdf18496e2b60324050ccfbbf3c182f390db39742ae18bad7e8f2946a21c5e0d356924dcbcb90ec2365dba1cf049b3b7f4
-
SSDEEP
49152:emNAx+EfHOCe19WUE7LrKy0zRrMbZsgieDs4BvEBRLBd:9KxRfHi19WUsCy0duZsgiusKEBR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 617e634e9975b34f7cffcb18f36c912147fd5fd0e090bf398bf831cc734e85e1_NeikiAnalytics.exe
Files
-
617e634e9975b34f7cffcb18f36c912147fd5fd0e090bf398bf831cc734e85e1_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
05ecba14ae6ba36d9d29826081033d8d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetRect
GetMessageA
DefWindowProcA
BeginPaint
GetWindowWord
EndPaint
SetWindowWord
LoadIconA
RegisterClassA
OemToCharA
SetWindowTextA
OemToCharBuffA
LoadCursorA
UpdateWindow
SendMessageA
GetTopWindow
GetLastActivePopup
EnableWindow
PostMessageA
GetClientRect
ShowWindow
GetDC
SetTimer
GetSysColor
ReleaseDC
SetCursor
KillTimer
PostQuitMessage
DialogBoxIndirectParamA
GetWindowRect
GetSystemMetrics
SetWindowPos
GetDlgItemTextA
EndDialog
PeekMessageA
TranslateMessage
DispatchMessageA
GetParent
SetDlgItemTextA
SendDlgItemMessageA
GetDlgItem
InvalidateRect
wsprintfA
MessageBoxA
kernel32
DosDateTimeToFileTime
GlobalLock
RtlUnwind
_lcreat
GetModuleHandleA
FindNextFileA
GetCommandLineA
SetFileAttributesA
DeleteFileA
RemoveDirectoryA
GetVersion
GetModuleFileNameA
SetErrorMode
GetTempPathA
GetTempFileNameA
CreateProcessA
WaitForSingleObject
GetTickCount
GetWindowsDirectoryA
OpenFile
LocalAlloc
GetCurrentDirectoryA
GlobalUnlock
GlobalHandle
LocalFree
LocalFileTimeToFileTime
GlobalAlloc
FindClose
FindFirstFileA
SetCurrentDirectoryA
lstrlenA
CreateDirectoryA
SetFileTime
_llseek
GlobalFree
lstrcpyA
_lopen
_lwrite
_lread
lstrcatA
_lclose
gdi32
SetTextColor
GetTextExtentPoint32A
GetBkColor
SetBkColor
ExtTextOutA
GetTextMetricsA
GetTextAlign
DeleteObject
TextOutA
SetTextAlign
SetBkMode
CreateDCA
GetDeviceCaps
CreateFontIndirectA
DeleteDC
SelectObject
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
_winzip_ Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ