Static task
static1
Behavioral task
behavioral1
Sample
3cf8d6a7834128dd3551ebb2b04f83cd388e5351b0caf415acb743b4aeef576f_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3cf8d6a7834128dd3551ebb2b04f83cd388e5351b0caf415acb743b4aeef576f_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
3cf8d6a7834128dd3551ebb2b04f83cd388e5351b0caf415acb743b4aeef576f_NeikiAnalytics.exe
-
Size
194KB
-
MD5
457922d0df8789cb4364e0de2c59f030
-
SHA1
067eaed6ead365293fe6da51090e8b1467fb9e54
-
SHA256
3cf8d6a7834128dd3551ebb2b04f83cd388e5351b0caf415acb743b4aeef576f
-
SHA512
e552bb3b076aef5210b39e64ada05b076e556193bd3c2b3398995e5c6e8c2e5b0efc0e1a723491d44ddc52e184ed52f9d6657947362359fee3c6b742e49d2247
-
SSDEEP
3072:bDXtEPmgFzyTxD2R53mK1oX69V2FTCX44wlImQ:bCPmYc2PhL9VYTThq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3cf8d6a7834128dd3551ebb2b04f83cd388e5351b0caf415acb743b4aeef576f_NeikiAnalytics.exe
Files
-
3cf8d6a7834128dd3551ebb2b04f83cd388e5351b0caf415acb743b4aeef576f_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
e6d96fab8010cc2ab678948b120a1a33
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WaitForSingleObject
CreateProcessA
ReadFile
CreatePipe
MultiByteToWideChar
WideCharToMultiByte
GlobalAlloc
GetModuleHandleA
GetProcAddress
FreeLibrary
FindFirstFileA
FindClose
DeleteFileA
GetThreadLocale
GetModuleFileNameA
LoadLibraryA
CreateDirectoryA
GetWindowsDirectoryA
SetHandleInformation
MoveFileA
GetLastError
GetOEMCP
GetACP
CompareStringA
GetCPInfo
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetFileAttributesA
SetFilePointer
SetEndOfFile
SetStdHandle
GetStdHandle
SetHandleCount
WriteFile
GetStringTypeW
GetStringTypeA
VirtualFree
HeapReAlloc
HeapDestroy
GetTimeZoneInformation
GetCurrentDirectoryA
GetFullPathNameA
GetExitCodeProcess
SetEnvironmentVariableW
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
LCMapStringW
LCMapStringA
FlushFileBuffers
SetEnvironmentVariableA
GetVersion
HeapCreate
CompareStringW
HeapFree
ExitProcess
TerminateProcess
GetCurrentProcess
HeapAlloc
VirtualAlloc
GetFileType
CreateFileA
RtlUnwind
GetStartupInfoA
GetCommandLineA
user32
GetMessageA
MessageBoxA
wsprintfA
ReleaseDC
GetDC
SetWindowPos
GetClientRect
GetDesktopWindow
EndPaint
BeginPaint
PostQuitMessage
DefWindowProcA
DispatchMessageA
LoadCursorA
RegisterClassA
CreateWindowExA
SetTimer
TranslateMessage
gdi32
CreateDIBSection
DeleteDC
BitBlt
SelectObject
CreateCompatibleDC
GetDeviceCaps
advapi32
RegCloseKey
RegQueryValueExA
RegEnumKeyExA
RegOpenKeyExA
wsock32
htons
WSAAsyncSelect
closesocket
WSAStartup
WSAGetLastError
send
connect
ioctlsocket
socket
bind
listen
ntohs
accept
recv
getsockname
Sections
.text Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE