Static task
static1
Behavioral task
behavioral1
Sample
4430883e12eed08372b86df606348926eacb9b9447454e1476c1b162cfd466e2_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4430883e12eed08372b86df606348926eacb9b9447454e1476c1b162cfd466e2_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
4430883e12eed08372b86df606348926eacb9b9447454e1476c1b162cfd466e2_NeikiAnalytics.exe
-
Size
193KB
-
MD5
6799625666b40027831877c38e096a60
-
SHA1
35f13af612c77ab324f4e78954d3f09d41ebde11
-
SHA256
4430883e12eed08372b86df606348926eacb9b9447454e1476c1b162cfd466e2
-
SHA512
aa6d45d156572d148608b911b79744263bc3b7785b814ab29c347dd7ded54a942f27844c28c587346b1ad9fdf630fb4e977530fc7dde888406814b1b8a3aa3ad
-
SSDEEP
3072:a/wNClyikutVZrGs+g6fN+WtjnRCWnyDEoCy7G9aYuQj:aINCklZ3l+WtjnR9nDoCEGZuO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4430883e12eed08372b86df606348926eacb9b9447454e1476c1b162cfd466e2_NeikiAnalytics.exe
Files
-
4430883e12eed08372b86df606348926eacb9b9447454e1476c1b162cfd466e2_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
64df6a4747d0880c7ac89acd637b1d5c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
GlobalLock
WaitForSingleObject
GetModuleHandleW
GlobalAlloc
InitializeCriticalSectionAndSpinCount
SizeofResource
LeaveCriticalSection
MulDiv
lstrcmpW
MultiByteToWideChar
lstrlenW
GlobalUnlock
FlushInstructionCache
RaiseException
SetLastError
GetProcAddress
EnterCriticalSection
lstrcmpiW
DeleteCriticalSection
GetCurrentThreadId
GetCurrentProcessId
GetVersionExW
GetSystemInfo
GetLocalTime
OutputDebugStringA
CreateThread
LoadLibraryExW
TerminateThread
InterlockedDecrement
LoadResource
FreeLibrary
FindResourceW
GetModuleFileNameA
GetPrivateProfileStringA
DeleteTimerQueueTimer
CloseHandle
CreateMutexW
CreateToolhelp32Snapshot
Process32NextW
InterlockedExchangeAdd
Process32FirstW
InterlockedIncrement
CreateTimerQueueTimer
GetLastError
InterlockedExchange
GetTempPathW
GetModuleFileNameW
TerminateProcess
Sleep
CopyFileW
OpenProcess
CreateProcessW
user32
GetWindowTextLengthW
DestroyWindow
ClientToScreen
EndPaint
wvsprintfW
PostThreadMessageW
InvalidateRect
DispatchMessageW
GetWindowThreadProcessId
DefWindowProcW
RegisterClassW
CreateWindowExW
FindWindowExW
GetForegroundWindow
TranslateMessage
LoadCursorW
PostQuitMessage
GetMessageW
RegisterClassExW
GetDC
GetClassInfoExW
BeginPaint
DestroyAcceleratorTable
GetWindow
CallWindowProcW
SetWindowTextW
SendMessageW
GetSystemMetrics
ReleaseCapture
IsWindow
LoadBitmapW
ShowWindow
SetWindowPos
GetSysColor
GetWindowLongW
RedrawWindow
SetWindowLongW
GetDlgItem
ReleaseDC
GetClassNameW
GetWindowTextW
SetFocus
CreateAcceleratorTableW
GetClientRect
SetParent
InvalidateRgn
GetParent
GetFocus
SetForegroundWindow
KillTimer
SetWindowRgn
SetTimer
PostMessageW
SetCapture
IsChild
FillRect
MoveWindow
GetDesktopWindow
ScreenToClient
CharNextW
RegisterWindowMessageW
gdi32
BitBlt
DeleteDC
GetDeviceCaps
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectW
CreateRectRgn
GetStockObject
CreateSolidBrush
advapi32
RegSetValueExW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegDeleteKeyW
RegQueryInfoKeyW
RegCreateKeyExW
ole32
CLSIDFromString
CLSIDFromProgID
CoTaskMemRealloc
OleLockRunning
CoCreateInstance
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
StringFromGUID2
OleUninitialize
CoTaskMemFree
CoGetClassObject
CoTaskMemAlloc
OleInitialize
oleaut32
OleCreateFontIndirect
SysFreeString
SysAllocString
SysStringLen
VariantClear
LoadTypeLi
VariantInit
SysAllocStringLen
VarUI4FromStr
LoadRegTypeLi
shlwapi
PathIsURLW
PathCombineW
StrCpyW
PathRemoveFileSpecA
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
?_Orphan_all@_Container_base0@std@@QAEXXZ
??1_Container_base12@std@@QAE@XZ
?id@?$numpunct@_W@std@@2V0locale@2@A
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@H@Z
?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ
?_Init@locale@std@@CAPAV_Locimp@12@XZ
?classic@locale@std@@SAABV12@XZ
_Mbrtowc
??0facet@locale@std@@IAE@I@Z
??1facet@locale@std@@UAE
Sections
.text Size: 125KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ