Static task
static1
Behavioral task
behavioral1
Sample
506e8c7a5cc3a4251dda8f87eacdb12809c9ed7a3441e71aaef9b0ba55e9f287_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
506e8c7a5cc3a4251dda8f87eacdb12809c9ed7a3441e71aaef9b0ba55e9f287_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
506e8c7a5cc3a4251dda8f87eacdb12809c9ed7a3441e71aaef9b0ba55e9f287_NeikiAnalytics.exe
-
Size
224KB
-
MD5
5e85f49be849e618550d8b8317250f00
-
SHA1
9487a4d20ac68f83328dd268b21b06286ba30afa
-
SHA256
506e8c7a5cc3a4251dda8f87eacdb12809c9ed7a3441e71aaef9b0ba55e9f287
-
SHA512
2e31c61d53f36000457213a216cb14a494dabdd87bbce8f50ccab371bdfa0074527e1774f5e1ab70049b16539b5bccf2cc62dd385a17f0583e4c4afeae5a11e9
-
SSDEEP
3072:IAT90ZtoeMTDApmnirZRrxrt+Uwb53blC74RbR:IAT9ctoFDAMQZRrLz74Rd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 506e8c7a5cc3a4251dda8f87eacdb12809c9ed7a3441e71aaef9b0ba55e9f287_NeikiAnalytics.exe
Files
-
506e8c7a5cc3a4251dda8f87eacdb12809c9ed7a3441e71aaef9b0ba55e9f287_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
83b4d9bc0c65c322eeb631d44fed51b2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
CreateDirectoryA
EnterCriticalSection
DeleteFileA
WaitForSingleObject
Sleep
TerminateProcess
ExitProcess
GetTickCount
InitializeCriticalSectionAndSpinCount
GetLastError
SetFileAttributesA
GetModuleFileNameA
CreateMutexA
DeleteCriticalSection
CloseHandle
CreateFileA
WriteFile
InterlockedDecrement
GetCurrentProcess
Process32First
OpenProcess
WideCharToMultiByte
CreateProcessA
SetLastError
Process32Next
CreateToolhelp32Snapshot
SetEndOfFile
CreateFileW
SetEnvironmentVariableA
LoadLibraryW
OutputDebugStringW
WriteConsoleW
SetStdHandle
ReadConsoleW
HeapReAlloc
GetOEMCP
IsValidCodePage
SetFilePointer
GetACP
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameW
HeapSize
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetFilePointerEx
ReadFile
AreFileApisANSI
GetModuleHandleExW
GetProcessHeap
GetFileType
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
InterlockedIncrement
EncodePointer
DecodePointer
MultiByteToWideChar
GetStringTypeW
lstrlenA
LocalFree
HeapFree
CreateThread
GetCurrentThreadId
ExitThread
GetProcAddress
LoadLibraryExW
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineA
RaiseException
RtlUnwind
HeapAlloc
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CompareStringW
LCMapStringW
user32
GetCursorPos
DispatchMessageA
ShowWindow
DefWindowProcA
CreateWindowExA
TranslateMessage
PostQuitMessage
RegisterClassExA
GetMessageA
UpdateWindow
ole32
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
CoUninitialize
CoCreateInstance
oleaut32
SysAllocString
VariantClear
SysFreeString
ws2_32
connect
WSAStartup
WSAGetLastError
htons
WSACleanup
recv
send
gethostbyname
closesocket
socket
Sections
.text Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ