Static task
static1
Behavioral task
behavioral1
Sample
633f78c1bcbf79f4e70f64772fc75406842d5005745944d1622c2cb4054d40fd_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
633f78c1bcbf79f4e70f64772fc75406842d5005745944d1622c2cb4054d40fd_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
633f78c1bcbf79f4e70f64772fc75406842d5005745944d1622c2cb4054d40fd_NeikiAnalytics.exe
-
Size
68KB
-
MD5
c96fa84510d8053563820c095314d800
-
SHA1
12528ac78699791bef0bec1e61dc25191cd3697d
-
SHA256
633f78c1bcbf79f4e70f64772fc75406842d5005745944d1622c2cb4054d40fd
-
SHA512
7cf52de22c610e35f26f982aec8fa2ab15af463d127f678eded0284bd6b1eb6eb3cd0768baceb69f82effbf8d669dc53db6908209291a8ffc9b23401f2ee6cca
-
SSDEEP
768:i8wizeNhQ4AMrZjhG6CvEO2qPFCFguE7KZoeTtLljphGBnZvkWr:i8wizefQTMrG6Czuzoe1ljKBZ8A
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 633f78c1bcbf79f4e70f64772fc75406842d5005745944d1622c2cb4054d40fd_NeikiAnalytics.exe
Files
-
633f78c1bcbf79f4e70f64772fc75406842d5005745944d1622c2cb4054d40fd_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
a04203eaa3ad77624c883ed447a06464
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeviceIoControl
GetVersionExA
GlobalAlloc
WaitForSingleObject
CreateEventA
ReleaseMutex
CreateMutexA
Sleep
GetLastError
GlobalFree
SearchPathA
GetSystemDirectoryA
SetEvent
OpenEventA
WaitForMultipleObjects
OpenProcess
GetCurrentProcessId
CloseHandle
CreateFileA
GetModuleHandleA
FreeLibrary
LoadLibraryA
GetProcAddress
LocalSize
LocalFree
CreateProcessA
lstrcpyA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
WriteFile
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
IsBadWritePtr
HeapAlloc
LCMapStringW
LocalAlloc
UnhandledExceptionFilter
GetStringTypeA
GetCurrentProcess
TerminateProcess
LCMapStringA
GetACP
GetCPInfo
GetOEMCP
ExitProcess
GetVersion
HeapFree
GetStartupInfoA
GetStringTypeW
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
VirtualAlloc
RtlUnwind
user32
GetForegroundWindow
TranslateMessage
LoadStringA
LoadIconA
DispatchMessageA
GetMessageA
DestroyIcon
LoadImageA
FindWindowA
SystemParametersInfoA
RegisterClassExA
IsDlgButtonChecked
AttachThreadInput
EndDialog
GetDlgItem
EnableWindow
DialogBoxParamA
PostQuitMessage
SetTimer
KillTimer
PostMessageA
DefWindowProcA
CreateWindowExA
ShowWindow
UpdateWindow
LoadCursorA
wsprintfA
RegisterWindowMessageA
SetForegroundWindow
GetWindowThreadProcessId
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
shell32
Shell_NotifyIconA
ole32
CLSIDFromString
comctl32
ord17
wtsapi32
WTSRegisterSessionNotification
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ