AutoPluginMain
Static task
static1
Behavioral task
behavioral1
Sample
2ae2095b3c9dc5f65e5e347359787a647316d76464e6f5c33a99dc46eb6f3760_NeikiAnalytics.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2ae2095b3c9dc5f65e5e347359787a647316d76464e6f5c33a99dc46eb6f3760_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
2ae2095b3c9dc5f65e5e347359787a647316d76464e6f5c33a99dc46eb6f3760_NeikiAnalytics.exe
-
Size
9.1MB
-
MD5
f377a3924309888b0269e78818161440
-
SHA1
1d910016206cb93b41cc064616923c617997be12
-
SHA256
2ae2095b3c9dc5f65e5e347359787a647316d76464e6f5c33a99dc46eb6f3760
-
SHA512
97b59057733e7c521656e0afa2a45b7be47bdc49cb1cad399c568a4a387cfdb4da05bd01397ff0c106d60916fe5a6f6daa6dfb3f8d6906e6449ab60ceda2af91
-
SSDEEP
98304:Siu8AzcF2JCWj/IhVNomctQ2I61/04q0G1ahMBIw7T/5:Siu8AzcFGC8/IhVNomcKMc5TIw7Th
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2ae2095b3c9dc5f65e5e347359787a647316d76464e6f5c33a99dc46eb6f3760_NeikiAnalytics.exe
Files
-
2ae2095b3c9dc5f65e5e347359787a647316d76464e6f5c33a99dc46eb6f3760_NeikiAnalytics.exe.dll windows:6 windows x64 arch:x64
4681a11546ad7c394e90709567b56cfc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
user32
MessageBoxA
GetActiveWindow
shlwapi
PathRemoveFileSpecA
msvcr120
__crtCapturePreviousContext
_initterm
?_type_info_dtor_internal_method@type_info@@QEAAXXZ
__clean_type_info_names_internal
__crtTerminateProcess
__crtUnhandledException
__crt_debugger_hook
?terminate@@YAXXZ
_initterm_e
_malloc_crt
free
_amsg_exit
__CppXcptFilter
_onexit
__C_specific_handler
__dllonexit
_calloc_crt
_unlock
_lock
memset
memcpy
__CxxFrameHandler3
_CxxThrowException
memmove
??3@YAXPEAX@Z
??2@YAPEAX_K@Z
_purecall
msvcp120
?_Syserror_map@std@@YAPEBDH@Z
?_Xout_of_range@std@@YAXPEBD@Z
?_Xlength_error@std@@YAXPEBD@Z
?_Xbad_alloc@std@@YAXXZ
?_Winerror_map@std@@YAPEBDH@Z
kernel32
DisableThreadLibraryCalls
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
IsProcessorFeaturePresent
IsDebuggerPresent
DecodePointer
EncodePointer
SetDllDirectoryA
GetTempPathA
FindResourceA
LoadLibraryA
SizeofResource
LockResource
LoadResource
GetProcAddress
GetModuleHandleExA
GetModuleFileNameA
CloseHandle
WriteFile
CreateFileA
QueryPerformanceCounter
Exports
Exports
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 540B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 9.1MB - Virtual size: 9.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ