Static task
static1
Behavioral task
behavioral1
Sample
67c6f60c7103e359f782650819bb42abd21faf0179214bc13194166248494b45_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
67c6f60c7103e359f782650819bb42abd21faf0179214bc13194166248494b45_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
67c6f60c7103e359f782650819bb42abd21faf0179214bc13194166248494b45_NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
6fe3ce390f1edf64032ad838bc39bda0
-
SHA1
b62a449537a71eadadb9c561172fd9552a5f370f
-
SHA256
67c6f60c7103e359f782650819bb42abd21faf0179214bc13194166248494b45
-
SHA512
a8b90e7d9a1e4c646c9ec3affe7f78eeae08924114836465f6f8d29a9c94a5879b4e2ba6960f08d560533102cfc169441bb1bb4446d94df4ba13bc77348f4033
-
SSDEEP
12288:puKXlB8FBeASZmi78Jk5HWVFeq9J8ng/0paQuj30s9fdD02fKBjtp/TEboaOvklG:pK2Zmi78Jk52qw860GejrbeCQe/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67c6f60c7103e359f782650819bb42abd21faf0179214bc13194166248494b45_NeikiAnalytics.exe
Files
-
67c6f60c7103e359f782650819bb42abd21faf0179214bc13194166248494b45_NeikiAnalytics.exe.exe windows:4 windows x64 arch:x64
2a6028724a24299febbe21b8b8918959
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
comctl32
ImageList_ReplaceIcon
InitCommonControlsEx
CreateToolbarEx
CreateStatusWindowW
ord17
ImageList_AddMasked
ImageList_GetImageCount
ImageList_Destroy
ImageList_Create
PropertySheetW
comdlg32
CommDlgExtendedError
GetSaveFileNameW
GetOpenFileNameW
gdi32
DeleteObject
oleaut32
SysFreeString
VariantCopy
VariantClear
SysAllocStringLen
SysStringLen
SysAllocString
SysStringByteLen
ole32
CoUninitialize
ReleaseStgMedium
CoTaskMemFree
CoTaskMemAlloc
RegisterDragDrop
RevokeDragDrop
OleUninitialize
OleInitialize
DoDragDrop
CoCreateInstance
CoInitialize
user32
DestroyIcon
CharUpperW
OpenClipboard
CloseClipboard
SetClipboardData
EmptyClipboard
GetMenuItemInfoW
SetMenuItemInfoW
InsertMenuItemW
LoadStringW
RegisterClipboardFormatW
SendMessageW
GetWindowTextLengthW
GetWindowTextW
GetParent
GetWindowRect
ScreenToClient
MoveWindow
ShowWindow
SetWindowLongPtrW
GetWindowLongPtrW
GetDlgItem
MapDialogRect
SystemParametersInfoW
GetMonitorInfoA
MonitorFromWindow
GetDialogBaseUnits
DialogBoxParamW
SetCursor
KillTimer
ClientToScreen
GetMenuItemCount
GetCursorPos
ChildWindowFromPointEx
WindowFromPoint
IsWindowEnabled
TrackPopupMenuEx
MapVirtualKeyW
SetTimer
UpdateWindow
GetMenu
LoadMenuW
SetMenu
DrawMenuBar
EnableMenuItem
CheckMenuItem
CheckMenuRadioItem
RemoveMenu
AppendMenuW
GetSubMenu
CheckRadioButton
IsDlgButtonChecked
CheckDlgButton
LoadAcceleratorsW
GetMessageW
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
LoadIconW
ReleaseCapture
SetCapture
GetCapture
IsZoomed
GetClientRect
PostQuitMessage
GetWindowPlacement
SetWindowPlacement
GetFocus
SetDlgItemTextW
GetKeyState
PostMessageW
InvalidateRect
EndDialog
EnableWindow
SetFocus
DestroyWindow
SetWindowTextW
LoadBitmapW
DestroyMenu
CreatePopupMenu
MessageBoxW
GetClassInfoW
LoadCursorW
RegisterClassW
DefWindowProcW
CallWindowProcW
CreateWindowExW
advapi32
RegQueryValueExA
RegOpenKeyExA
LsaClose
LsaAddAccountRights
LookupAccountNameW
LsaOpenPolicy
GetUserNameW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
GetFileSecurityW
SetFileSecurityW
RegEnumKeyExW
RegOpenKeyExW
RegCreateKeyExW
RegQueryValueExW
RegSetValueExW
RegDeleteValueW
RegDeleteKeyW
shell32
SHGetFileInfoW
SHFileOperationW
ExtractIconExW
SHChangeNotify
ShellExecuteExW
SHGetDesktopFolder
SHBrowseForFolderW
SHGetPathFromIDListW
ShellExecuteW
SHGetSpecialFolderLocation
msvcrt
_initterm
__getmainargs
_acmdln
exit
_cexit
_exit
_c_exit
_XcptFilter
_onexit
__dllonexit
?terminate@@YAXXZ
__setusermatherr
__C_specific_handler
_beginthreadex
_purecall
memcmp
strlen
wcslen
memset
rand
srand
free
malloc
_commode
_fmode
__set_app_type
??1type_info@@UEAA@XZ
memcpy
_CxxThrowException
__CxxFrameHandler
memmove
strcmp
wcscmp
wcsstr
kernel32
ExpandEnvironmentStringsW
SetPriorityClass
Sleep
OpenProcess
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetSystemDefaultLangID
GetUserDefaultLangID
CopyFileW
GetCompressedFileSizeW
FindNextChangeNotification
GetCommandLineW
GetVersion
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
WaitForMultipleObjects
CreateEventW
WaitForSingleObject
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetStdHandle
GetSystemTimeAsFileTime
FileTimeToDosDateTime
GlobalMemoryStatusEx
GlobalSize
lstrlenW
FileTimeToLocalFileTime
FileTimeToSystemTime
CompareFileTime
CreateProcessW
GetCurrentProcess
GlobalFree
SetEndOfFile
WriteFile
ReadFile
SetFilePointer
GetFileSize
DeviceIoControl
GetLogicalDriveStringsW
FindFirstChangeNotificationW
FindCloseChangeNotification
GetFileAttributesW
GetModuleHandleA
FindNextFileW
VirtualAlloc
FindClose
GetFileInformationByHandle
GetCurrentThreadId
GetCurrentProcessId
SetLastError
GetTempPathW
GetCurrentDirectoryW
DeleteFileW
CreateDirectoryW
MoveFileW
RemoveDirectoryW
SetFileAttributesW
CreateFileW
SetFileTime
CloseHandle
GetWindowsDirectoryW
FormatMessageW
LocalFree
GetModuleFileNameW
LoadLibraryW
LoadLibraryExW
FreeLibrary
GlobalUnlock
GlobalLock
GetProcessHeap
HeapAlloc
HeapFree
GetModuleHandleW
GetProcAddress
GetDiskFreeSpaceW
GetDriveTypeW
GetVolumeInformationW
WideCharToMultiByte
MultiByteToWideChar
GetLastError
GetTickCount
RtlCaptureContext
SetEvent
InitializeCriticalSection
LoadLibraryA
LocalAlloc
RaiseException
GetStartupInfoA
QueryPerformanceCounter
TerminateProcess
FindFirstFileW
VirtualFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
GlobalAlloc
Sections
.text Size: 600KB - Virtual size: 600KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 218KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ