Static task
static1
Behavioral task
behavioral1
Sample
5f4c117cd7f2a02006da52cd5725d8c2579d2cab1fa8a1dd85faaab47fd04ecb_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5f4c117cd7f2a02006da52cd5725d8c2579d2cab1fa8a1dd85faaab47fd04ecb_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
5f4c117cd7f2a02006da52cd5725d8c2579d2cab1fa8a1dd85faaab47fd04ecb_NeikiAnalytics.exe
-
Size
494KB
-
MD5
1fd4e62013aa31b99b3db397b6db9ce0
-
SHA1
8d3baf8e1f19bd44903afa2cdb87a4d31fb4a938
-
SHA256
5f4c117cd7f2a02006da52cd5725d8c2579d2cab1fa8a1dd85faaab47fd04ecb
-
SHA512
42215bba99a745ae1778b4f6296db0142ce25ea546fc59c8f3820ba00b486e26b2308819e4e44d994aad1dd42a975d6b75ed1cbbbc7e21c1e01df5a7cd5d2ae5
-
SSDEEP
12288:IrFu5n+lFTv5qVxivxwJrsdbvutQdaEsBu:I45n2v8VxGwJkbvutLEsBu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5f4c117cd7f2a02006da52cd5725d8c2579d2cab1fa8a1dd85faaab47fd04ecb_NeikiAnalytics.exe
Files
-
5f4c117cd7f2a02006da52cd5725d8c2579d2cab1fa8a1dd85faaab47fd04ecb_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
03f7f7b24a987d0df8f355938b367590
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadResource
WriteTapemark
GetUserDefaultLCID
CreateHardLinkA
GetCommProperties
FindNextVolumeMountPointA
FormatMessageA
GetCommandLineA
GetDriveTypeA
GetProcessTimes
GetCurrencyFormatW
GlobalAlloc
LoadLibraryW
GetConsoleMode
SizeofResource
InitAtomTable
GetFileAttributesW
IsBadStringPtrA
SetConsoleTitleA
ReplaceFileA
GetLastError
GetProcessIoCounters
GetProcAddress
BuildCommDCBW
OpenWaitableTimerA
GetProcessWorkingSetSize
WritePrivateProfileStringA
SetProcessWorkingSetSize
AddAtomA
SetCommMask
GetTapeParameters
DebugSetProcessKillOnExit
GetProcessShutdownParameters
DebugBreakProcess
GetCurrentProcessId
OpenFileMappingA
LocalFree
LCMapStringW
GetNumberOfConsoleInputEvents
DebugActiveProcessStop
lstrlenA
IsBadStringPtrW
GetLongPathNameW
lstrcmpA
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoA
GetCPInfo
RtlUnwind
RaiseException
LCMapStringA
GetStringTypeW
HeapAlloc
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetStringTypeA
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetLocaleInfoW
user32
SetCaretPos
advapi32
GetSecurityDescriptorSacl
GetSecurityDescriptorOwner
LockServiceDatabase
RegSetValueExA
SetSecurityDescriptorSacl
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 330KB - Virtual size: 1018KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ