Static task
static1
Behavioral task
behavioral1
Sample
4f182f0b0ee75ec849cfe25c06f2fdf88fb2bb82272a5ebc54295b1c205c458b_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4f182f0b0ee75ec849cfe25c06f2fdf88fb2bb82272a5ebc54295b1c205c458b_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
4f182f0b0ee75ec849cfe25c06f2fdf88fb2bb82272a5ebc54295b1c205c458b_NeikiAnalytics.exe
-
Size
181KB
-
MD5
4553d77a079faf8bdb7c612f31b9d190
-
SHA1
16813620883bdd635d7632bec1cee5514de86850
-
SHA256
4f182f0b0ee75ec849cfe25c06f2fdf88fb2bb82272a5ebc54295b1c205c458b
-
SHA512
a82509f9548617ffe5d356f527f78a03053cd9186cb55f7dd922732a1e14afc5bf7c5c6e2cc81b65198e2088486d1664fbb803a512b1060044146023a3c8d408
-
SSDEEP
3072:N6Tm3mElcGLE14JxRJ3j3FPLw0O0qnPbKr8rF9cOH7XMY3sPDWdKBetUxY4n7KzR:E63ZG4u4JxRJzVPLnO0qP3Fd7cYaCdKq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4f182f0b0ee75ec849cfe25c06f2fdf88fb2bb82272a5ebc54295b1c205c458b_NeikiAnalytics.exe
Files
-
4f182f0b0ee75ec849cfe25c06f2fdf88fb2bb82272a5ebc54295b1c205c458b_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
05ecba14ae6ba36d9d29826081033d8d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetRect
GetMessageA
DefWindowProcA
BeginPaint
GetWindowWord
EndPaint
SetWindowWord
LoadIconA
RegisterClassA
OemToCharA
SetWindowTextA
OemToCharBuffA
LoadCursorA
UpdateWindow
SendMessageA
GetTopWindow
GetLastActivePopup
EnableWindow
PostMessageA
GetClientRect
ShowWindow
GetDC
SetTimer
GetSysColor
ReleaseDC
SetCursor
KillTimer
PostQuitMessage
DialogBoxIndirectParamA
GetWindowRect
GetSystemMetrics
SetWindowPos
GetDlgItemTextA
EndDialog
PeekMessageA
TranslateMessage
DispatchMessageA
GetParent
SetDlgItemTextA
SendDlgItemMessageA
GetDlgItem
InvalidateRect
wsprintfA
MessageBoxA
kernel32
DosDateTimeToFileTime
GlobalLock
RtlUnwind
_lcreat
GetModuleHandleA
FindNextFileA
GetCommandLineA
SetFileAttributesA
DeleteFileA
RemoveDirectoryA
GetVersion
GetModuleFileNameA
SetErrorMode
GetTempPathA
GetTempFileNameA
CreateProcessA
WaitForSingleObject
GetTickCount
GetWindowsDirectoryA
OpenFile
LocalAlloc
GetCurrentDirectoryA
GlobalUnlock
GlobalHandle
LocalFree
LocalFileTimeToFileTime
GlobalAlloc
FindClose
FindFirstFileA
SetCurrentDirectoryA
lstrlenA
CreateDirectoryA
SetFileTime
_llseek
GlobalFree
lstrcpyA
_lopen
_lwrite
_lread
lstrcatA
_lclose
gdi32
SetTextColor
GetTextExtentPoint32A
GetBkColor
SetBkColor
ExtTextOutA
GetTextMetricsA
GetTextAlign
DeleteObject
TextOutA
SetTextAlign
SetBkMode
CreateDCA
GetDeviceCaps
CreateFontIndirectA
DeleteDC
SelectObject
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
_winzip_ Size: 154KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ