Static task
static1
Behavioral task
behavioral1
Sample
3a7a798135dad2e2f201b849f0cc1af7611f5161cb53e2c356c10d93ed448e87_NeikiAnalytics.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3a7a798135dad2e2f201b849f0cc1af7611f5161cb53e2c356c10d93ed448e87_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
3a7a798135dad2e2f201b849f0cc1af7611f5161cb53e2c356c10d93ed448e87_NeikiAnalytics.exe
-
Size
152KB
-
MD5
a0a8b902d912ab3d566deb18994f23b0
-
SHA1
6b238812b5d6c675a98a594543d0e0f23c11a8e6
-
SHA256
3a7a798135dad2e2f201b849f0cc1af7611f5161cb53e2c356c10d93ed448e87
-
SHA512
13e77a6dbf77fe56940c5e2fd95e467f99762c86e9d8911b13d60594bfc176fbe19b6ce9564e383517c57e527bc4be79c391284510c7ab05e13bc6a60c6d774c
-
SSDEEP
3072:HzNSu/CQxvFOd8wMPqqGCY2YHheryEnfWIilnlzDE2h:To8CQlFOGw2qqGCdeUBfm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a7a798135dad2e2f201b849f0cc1af7611f5161cb53e2c356c10d93ed448e87_NeikiAnalytics.exe
Files
-
3a7a798135dad2e2f201b849f0cc1af7611f5161cb53e2c356c10d93ed448e87_NeikiAnalytics.exe.dll windows:4 windows x86 arch:x86
f8d21ecf2a7a3e2ac5dbd707e37049c9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ilock
InterlockedExchange
kernel32
FindFirstFileA
FindNextFileA
GetProcAddress
GetModuleHandleA
lstrcmpA
lstrcmpiA
LoadLibraryA
AllocConsole
GetACP
GetCommandLineA
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetEnvironmentStrings
GetLastError
GetLogicalDrives
GetOEMCP
GetVersion
TlsAlloc
CloseHandle
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExitProcess
FindClose
FlushFileBuffers
FreeLibrary
GetDriveTypeA
GetFileAttributesA
GetFileType
GetLocalTime
GetStartupInfoA
GetStdHandle
GetSystemTime
GetTimeZoneInformation
GlobalFree
GlobalMemoryStatus
GlobalLock
GlobalUnlock
HeapDestroy
InitializeCriticalSection
LeaveCriticalSection
LocalFree
RemoveDirectoryA
ResumeThread
SetConsoleTitleA
SetCurrentDirectoryA
SetEndOfFile
SetHandleCount
SetLastError
SetSystemTime
SetUnhandledExceptionFilter
Sleep
TlsFree
TlsGetValue
UnhandledExceptionFilter
Beep
CreateDirectoryA
FileTimeToLocalFileTime
GetConsoleMode
GetConsoleScreenBufferInfo
GetCurrentDirectoryA
GetExitCodeProcess
GetNumberOfConsoleInputEvents
LocalAlloc
MoveFileA
SetConsoleCtrlHandler
SetConsoleCursorInfo
SetConsoleCursorPosition
SetConsoleMode
SetConsoleScreenBufferSize
SetEnvironmentVariableA
SetFileAttributesA
SetStdHandle
SetThreadPriority
TerminateProcess
TlsSetValue
WaitForSingleObject
FileTimeToDosDateTime
GetEnvironmentVariableA
GetModuleFileNameA
HeapAlloc
HeapCreate
HeapFree
HeapSize
SetConsoleWindowInfo
VirtualFree
GetFullPathNameA
HeapReAlloc
PeekConsoleInputA
RaiseException
ReadConsoleInputA
SetFilePointer
VirtualAlloc
FillConsoleOutputAttribute
FillConsoleOutputCharacterA
GetDiskFreeSpaceA
LockFile
ReadFile
ScrollConsoleScreenBufferA
WriteConsoleOutputA
WriteFile
UnlockFile
CreateFileMappingA
CreateThread
MultiByteToWideChar
CreateFileA
DuplicateHandle
GetVolumeInformationA
WideCharToMultiByte
CreateProcessA
lstrcpyA
RtlUnwind
Sections
.text Size: 88KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ