Static task
static1
Behavioral task
behavioral1
Sample
23c67449d81a51960001a6135762af4e18d0decc638f1c45c1405fe26a06ad80_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
23c67449d81a51960001a6135762af4e18d0decc638f1c45c1405fe26a06ad80_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
23c67449d81a51960001a6135762af4e18d0decc638f1c45c1405fe26a06ad80_NeikiAnalytics.exe
-
Size
42KB
-
MD5
1dc9b5595c12b6407f25ea80f9a0fff0
-
SHA1
181bbda334bd73568abc5f6be8c8f9db2dbf42a2
-
SHA256
23c67449d81a51960001a6135762af4e18d0decc638f1c45c1405fe26a06ad80
-
SHA512
0094ab151b2f56d3e2307999efa4fd485905567385a40bf2addcbf556dd67c473e3e23aabc8af1b89076e0567d5e767f6496ede4c2de2cc21fdd7988f6f4e92b
-
SSDEEP
384:vSocYGpVDjk09B03ePAnlUYbpOl+FRPxDnRWHQW:AVjk0IDl9q+NS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 23c67449d81a51960001a6135762af4e18d0decc638f1c45c1405fe26a06ad80_NeikiAnalytics.exe
Files
-
23c67449d81a51960001a6135762af4e18d0decc638f1c45c1405fe26a06ad80_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
26b58250d7cf21ebfb92c1c9b6ac9150
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_except_handler3
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__initenv
exit
_cexit
_XcptFilter
_exit
_c_exit
advapi32
OpenProcessToken
RegCreateKeyExW
RegQueryValueExW
RegCloseKey
RegSetValueExW
kernel32
lstrcmpiW
GetCurrentProcessId
ExitProcess
CreateThread
GetCurrentProcess
CloseHandle
GetWindowsDirectoryW
SetCurrentDirectoryW
lstrlenW
ExitThread
LocalUnlock
LocalAlloc
GetCurrentDirectoryW
SetPriorityClass
GetModuleHandleW
GetModuleHandleA
lstrcpyW
LocalFree
LocalLock
user32
CreateDialogParamW
RegisterHotKey
InternalGetWindowText
EndTask
RegisterTasklist
GetMessageW
IsDialogMessageW
GetCursorPos
TranslateMessage
SwitchToThisWindow
DispatchMessageW
SendMessageW
GetDlgItem
SetWindowPos
ShowWindow
SetDlgItemTextW
SetForegroundWindow
SendDlgItemMessageW
DestroyWindow
GetWindowLongW
GetLastActivePopup
IsWindow
MessageBoxW
LoadStringW
wsprintfW
CharNextW
ShowCursor
GetSystemMetrics
SetCursor
LoadCursorW
GetWindowRect
ArrangeIconicWindows
SetFocus
PostMessageW
TileChildWindows
GetKeyState
CascadeChildWindows
GetDesktopWindow
GetDlgItemTextW
PostQuitMessage
EnableWindow
GetWindowThreadProcessId
GetWindow
IsWindowVisible
MessageBeep
shell32
DoEnvironmentSubstW
SheRemoveQuotesW
CheckEscapesW
RealShellExecuteW
RegenerateUserEnvironment
ntdll
RtlEqualSid
RtlAllocateAndInitializeSid
NtQueryInformationToken
NtSetInformationProcess
NtQueryInformationProcess
RtlFreeSid
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE