Behavioral task
behavioral1
Sample
6d2822025de0e10fbff8587109b6e2d4353bc411a07e9e44e6b8164649e71498_NeikiAnalytics.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
6d2822025de0e10fbff8587109b6e2d4353bc411a07e9e44e6b8164649e71498_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
6d2822025de0e10fbff8587109b6e2d4353bc411a07e9e44e6b8164649e71498_NeikiAnalytics.exe
-
Size
781KB
-
MD5
cf7685bbdc5e9690ee7c9e55254a9a80
-
SHA1
f707694f745aa884c88dc8e38929dabced598ab9
-
SHA256
6d2822025de0e10fbff8587109b6e2d4353bc411a07e9e44e6b8164649e71498
-
SHA512
d563a0fb13219fa0e1962568741fa2c700ac50fcbb497b74c0d9aef166851afd57f4fef13eb14cf1657f25c8351dd0c48c00e2409d390487a4d4d0042d5bc46d
-
SSDEEP
24576:E66e11wMPAquD0gCCBnyC+O8Vk4b5dy5F:E66+Pruh36Oj4b5dK
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6d2822025de0e10fbff8587109b6e2d4353bc411a07e9e44e6b8164649e71498_NeikiAnalytics.exe
Files
-
6d2822025de0e10fbff8587109b6e2d4353bc411a07e9e44e6b8164649e71498_NeikiAnalytics.exe.dll windows:4 windows x86 arch:x86
a3a6125cfffcf40193741d002dfd0706
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetVersionExA
GetVersion
GetVersionExA
GetVersion
ResetEvent
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
DeleteMenu
advapi32
SetNamedSecurityInfoA
oleaut32
SysFreeString
version
VerQueryValueA
gdi32
CreateSolidBrush
ole32
CoCreateInstance
comctl32
ImageList_EndDrag
shell32
SHGetFileInfoA
wininet
DeleteUrlCacheEntry
urlmon
UrlMkGetSessionOption
wsock32
socket
ntdll
NtTerminateProcess
iphlpapi
GetAdaptersInfo
oleacc
ObjectFromLresult
gdiplus
GdipDeleteGraphics
imagehlp
MapFileAndCheckSumA
atl
AtlAxWinInit
ws2_32
WSAIoctl
Sections
CODE Size: - Virtual size: 782KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 14KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 771KB - Virtual size: 770KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ