CPlApplet
Static task
static1
Behavioral task
behavioral1
Sample
3663eb6a8a0bd4b4d7469ad7e33f8d28d87448615c9fa1212dadf334df723fc6_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3663eb6a8a0bd4b4d7469ad7e33f8d28d87448615c9fa1212dadf334df723fc6_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
3663eb6a8a0bd4b4d7469ad7e33f8d28d87448615c9fa1212dadf334df723fc6_NeikiAnalytics.exe
-
Size
123KB
-
MD5
c6d1fefb11bb837a4c1c797005ce7f20
-
SHA1
4f414eb02568a9d8bd049125b100b693ad4b2bbe
-
SHA256
3663eb6a8a0bd4b4d7469ad7e33f8d28d87448615c9fa1212dadf334df723fc6
-
SHA512
b7ecb0f0f94cd10bfefca9e95cb8e865afe53114bb2dbe3c5b96c4f0d398a49d80fc1ca34351cd1567a2d6d051f6f247cd6f67958ddf509f4cb3f006deab2d43
-
SSDEEP
1536:aZCmwiAMlag0NG8cXOehHFowsykziWWiSw/N:4CmwXMlsNGJPhlIy0h/N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3663eb6a8a0bd4b4d7469ad7e33f8d28d87448615c9fa1212dadf334df723fc6_NeikiAnalytics.exe
Files
-
3663eb6a8a0bd4b4d7469ad7e33f8d28d87448615c9fa1212dadf334df723fc6_NeikiAnalytics.exe.dll windows:5 windows x86 arch:x86
770ea13df8e6d0b41e44f1f57e17f611
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
kernel32
DeleteCriticalSection
EnterCriticalSection
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetSystemTimeAsFileTime
GetTickCount
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
QueryPerformanceCounter
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
msvcrt
__dllonexit
_amsg_exit
_initterm
_iob
_lock
_onexit
_unlock
abort
calloc
free
fwrite
memmove
strlen
strncmp
vfprintf
_vsnwprintf
setupapi
CM_Get_Child
CM_Get_DevNode_Registry_PropertyW
CM_Get_DevNode_Status
CM_Get_Device_IDW
CM_Get_Device_ID_Size
CM_Get_Sibling
CM_Request_Device_EjectW
SetupDiDestroyClassImageList
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
SetupDiGetClassDevsW
SetupDiGetClassImageIndex
SetupDiGetClassImageList
pSetupGuidFromString
user32
ClientToScreen
DestroyIcon
DestroyMenu
DialogBoxParamW
EnableWindow
EndDialog
GetDlgItem
GetSubMenu
GetSystemMetrics
GetWindowLongW
KillTimer
LoadImageW
LoadMenuW
LoadStringW
MessageBoxW
SendMessageW
SetTimer
SetWindowLongW
SetWindowTextW
TrackPopupMenu
Exports
Exports
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 952B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 72B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ