Static task
static1
Behavioral task
behavioral1
Sample
2fc20e69879d66ea47a1d28b750a81e563a0d361b5483d8c29f128763e4332d7_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2fc20e69879d66ea47a1d28b750a81e563a0d361b5483d8c29f128763e4332d7_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
2fc20e69879d66ea47a1d28b750a81e563a0d361b5483d8c29f128763e4332d7_NeikiAnalytics.exe
-
Size
2.6MB
-
MD5
6afea8d62bdbd90e30565b03c364c2e0
-
SHA1
b6cc9a27e85fbb318a1792c06ce1c3e5708fc8f4
-
SHA256
2fc20e69879d66ea47a1d28b750a81e563a0d361b5483d8c29f128763e4332d7
-
SHA512
3ff81695cf63f7127c67d82c0f75d65e2c499a32848346e31621c16fd0f48291729d8300a53a5684de61a1f2393880698b480c4e11094da2867f1b463112a17c
-
SSDEEP
49152:HyjO7pV7rNUDft+to/sb7q9Azg89/5Ikodr6sU1bxIfysy/Ik3F:HyjipV7xUDct7b75ZdSU1bSBk3F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2fc20e69879d66ea47a1d28b750a81e563a0d361b5483d8c29f128763e4332d7_NeikiAnalytics.exe
Files
-
2fc20e69879d66ea47a1d28b750a81e563a0d361b5483d8c29f128763e4332d7_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
17008b2492d3808e3565297f3aecc2ce
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvfw32
MCIWndCreateA
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
user32
SetCursor
GetClassInfoA
DestroyWindow
FindWindowA
ClientToScreen
SetCursorPos
GetAsyncKeyState
SetWindowPos
DefWindowProcA
DrawTextA
DrawTextW
IsWindowVisible
IsIconic
GetDC
ReleaseDC
UnregisterHotKey
RegisterHotKey
MessageBoxIndirectA
SendMessageA
GetCursorPos
ScreenToClient
WaitMessage
ShowCursor
PeekMessageA
TranslateMessage
DispatchMessageA
GetWindowRect
LoadIconA
RegisterClassA
GetDesktopWindow
GetClientRect
CreateWindowExA
UpdateWindow
ShowWindow
PostQuitMessage
UnregisterClassA
LoadCursorA
wsprintfA
SetFocus
GetParent
SetWindowPlacement
AdjustWindowRectEx
GetWindowLongA
GetMenu
GetWindowPlacement
GetSystemMetrics
gdi32
StretchBlt
GetStockObject
CreateFontIndirectA
SetBkMode
SelectObject
SetTextColor
DeleteObject
GetDeviceCaps
GetPaletteEntries
advapi32
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyA
RegCloseKey
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
ole32
CoInitialize
CoCreateInstance
ddraw
DirectDrawEnumerateExA
DirectDrawCreateEx
winmm
timeGetTime
kernel32
SetUnhandledExceptionFilter
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
ReadFile
SetFilePointer
SetStdHandle
GetStdHandle
SetHandleCount
WriteFile
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
FlushFileBuffers
IsBadCodePtr
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetCPInfo
GetACP
GetOEMCP
SetEndOfFile
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
RaiseException
GetVersion
GetStartupInfoA
GetCurrentProcess
TerminateProcess
ExitProcess
CreateDirectoryA
SetEnvironmentVariableA
GetFileType
FileTimeToLocalFileTime
FileTimeToSystemTime
GetProcAddress
LoadLibraryA
GetSystemDefaultLangID
QueryPerformanceFrequency
GetTickCount
GetCommandLineA
GetSystemDirectoryA
GetProfileStringA
MultiByteToWideChar
WritePrivateProfileStringA
GetLastError
GetShortPathNameA
QueryPerformanceCounter
Sleep
GetModuleFileNameA
IsBadReadPtr
GetModuleHandleA
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileA
UnmapViewOfFile
CloseHandle
DeleteFileA
GetVersionExA
GetWindowsDirectoryA
HeapFree
HeapAlloc
RtlUnwind
HeapReAlloc
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetFileAttributesA
FindFirstFileA
FindNextFileA
FindClose
Sections
.text Size: 204KB - Virtual size: 203KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ