Static task
static1
Behavioral task
behavioral1
Sample
30826468ff4adac33196e7553997a1c1d1a202f75439793369471280d9455b2b_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
30826468ff4adac33196e7553997a1c1d1a202f75439793369471280d9455b2b_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
30826468ff4adac33196e7553997a1c1d1a202f75439793369471280d9455b2b_NeikiAnalytics.exe
-
Size
255KB
-
MD5
dd0387690b2d6a3e58843e8802894ce0
-
SHA1
d79ff4a37b6f5f09eb97b13a785b6cb4b54df266
-
SHA256
30826468ff4adac33196e7553997a1c1d1a202f75439793369471280d9455b2b
-
SHA512
9b85e690d2befdc68c8f5a3e7cdb57903c635dd1a480a31a4a25d996d72cb4f5d7aaa91125479fe500434b08dd121c0538dc5c5d8e79be367e16cd75f4b6c100
-
SSDEEP
3072:tOKWTMpAZCRJA0yuog8ADS3f36cVg59WgTrIwuN+NhglVekUWwsgDzgOpCwJ1XMO:tOKUIAc5z8Vg/PrIzbOlp1JZMiB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 30826468ff4adac33196e7553997a1c1d1a202f75439793369471280d9455b2b_NeikiAnalytics.exe
Files
-
30826468ff4adac33196e7553997a1c1d1a202f75439793369471280d9455b2b_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
986b5a9094b495ca7e95c1661bffa10f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetShortPathNameA
GetFullPathNameA
MoveFileA
lstrcatA
lstrlenA
lstrcpyA
SetFileAttributesA
Sleep
RemoveDirectoryA
CopyFileA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
lstrcpynA
SearchPathA
GetTickCount
GetDiskFreeSpaceA
CreateThread
CreateProcessA
CreateFileA
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetWindowsDirectoryA
CreateDirectoryA
GetSystemDirectoryA
MultiByteToWideChar
GetTempPathA
GetTempFileNameA
GetFileAttributesA
CompareFileTime
SetFileTime
CloseHandle
FindFirstFileA
DeleteFileA
FindNextFileA
lstrcmpiA
GetEnvironmentVariableA
ExpandEnvironmentStringsA
WaitForSingleObject
GetExitCodeProcess
LoadLibraryA
GetProcAddress
GlobalFree
FreeLibrary
GetCurrentProcess
ExitProcess
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
SetFilePointer
FindClose
MulDiv
GlobalAlloc
GetCommandLineA
user32
EnableWindow
SetWindowPos
ScreenToClient
GetWindowRect
GetDlgItem
SetClassLongA
GetParent
CharPrevA
GetDlgItemTextA
SendDlgItemMessageA
LoadBitmapA
IsWindowVisible
SetDlgItemTextA
CharNextA
CreateDialogParamA
DestroyWindow
PostQuitMessage
ShowWindow
SetFocus
MessageBoxA
wsprintfA
FindWindowExA
IsWindow
PeekMessageA
ExitWindowsEx
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
SetRect
FillRect
GetWindowTextA
DrawTextA
EndPaint
LoadIconA
LoadCursorA
RegisterClassA
SystemParametersInfoA
GetDesktopWindow
EndDialog
IsWindowEnabled
DialogBoxParamA
SetTimer
SetForegroundWindow
SetWindowTextA
CreateWindowExA
DispatchMessageA
gdi32
GetStockObject
SetBkColor
CreatePen
CreateBrushIndirect
MoveToEx
LineTo
GetTextColor
CreateCompatibleDC
BitBlt
CreateSolidBrush
DeleteObject
CreateFontA
SetBkMode
SetTextColor
GetNearestColor
SelectObject
advapi32
RegCreateKeyA
RegDeleteKeyA
RegOpenKeyExA
RegDeleteValueA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegEnumKeyA
RegEnumValueA
shell32
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
SHFileOperationA
SHBrowseForFolderA
ole32
CoCreateInstance
OleUninitialize
OleInitialize
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
comctl32
ord17
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ