Static task
static1
Behavioral task
behavioral1
Sample
8e1cb7b6943e70eae4b9fdf8f77cbf3d58f0b90dd1537b0d0489742249ba0ee0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8e1cb7b6943e70eae4b9fdf8f77cbf3d58f0b90dd1537b0d0489742249ba0ee0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
8e1cb7b6943e70eae4b9fdf8f77cbf3d58f0b90dd1537b0d0489742249ba0ee0_NeikiAnalytics.exe
-
Size
934KB
-
MD5
6fd4e38f12c66f1c0d9576906b0d4f80
-
SHA1
33316633573061e137aa6c2fd79a900b0c67f13b
-
SHA256
8e1cb7b6943e70eae4b9fdf8f77cbf3d58f0b90dd1537b0d0489742249ba0ee0
-
SHA512
73eb17f1343e36dbefac79c84299669e8aa662105b3f47603a7349f8e06eff151f957bc9b3bc2c57b05bb47d32b2e095c683317f426e27a1b21634a116ae02b1
-
SSDEEP
24576:rsTfjaDvXAjU78S/ZTwGUo9xEaQJFJBV1Ls2wBPd:KODvQc8SxTwGx9xEaQnJBV1Ls2wBF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e1cb7b6943e70eae4b9fdf8f77cbf3d58f0b90dd1537b0d0489742249ba0ee0_NeikiAnalytics.exe
Files
-
8e1cb7b6943e70eae4b9fdf8f77cbf3d58f0b90dd1537b0d0489742249ba0ee0_NeikiAnalytics.exe.exe windows:4 windows x64 arch:x64
4c641f6c8e2f0160fda7273b7eef9224
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
memset
memmove
sprintf
strstr
strncmp
strncpy
_strnicmp
_isnan
_stricmp
setlocale
atof
_strdup
free
fread
fclose
ftell
fseek
memcpy
log10
fopen
strcmp
strlen
strcpy
strcat
memcmp
longjmp
_setjmp
tolower
fmodf
fabs
ceil
malloc
floor
_errno
realloc
calloc
toupper
perror
atan
fprintf
log
ldexp
pow
qsort
exp
sqrt
cos
sin
exit
frexp
acos
memchr
modf
sinf
cosf
abs
kernel32
GetModuleHandleA
HeapCreate
IsDebuggerPresent
OpenProcess
GetTickCount
WriteProcessMemory
ReadProcessMemory
VirtualAllocEx
CreateRemoteThread
WaitForSingleObject
GetExitCodeThread
VirtualFreeEx
CloseHandle
CreateToolhelp32Snapshot
Module32First
Module32Next
VirtualProtectEx
HeapDestroy
ExitProcess
GetCurrentProcess
VirtualQueryEx
GetProcAddress
GetLastError
HeapFree
TlsGetValue
HeapAlloc
TlsSetValue
TlsAlloc
WaitForMultipleObjects
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
InitializeCriticalSection
GetCurrentThread
DuplicateHandle
CreateSemaphoreA
CreateThread
ReleaseSemaphore
LoadLibraryA
CreateFileA
GetFileSize
ReadFile
Sleep
FreeLibrary
GetCurrentProcessId
GetModuleFileNameA
CreatePipe
GetStdHandle
CreateProcessA
TerminateProcess
RtlLookupFunctionEntry
RtlVirtualUnwind
RemoveVectoredExceptionHandler
AddVectoredExceptionHandler
MultiByteToWideChar
WideCharToMultiByte
GlobalLock
GlobalSize
GlobalUnlock
GlobalAlloc
GlobalFree
HeapReAlloc
GetVersionExA
QueryPerformanceFrequency
QueryPerformanceCounter
SetLastError
MulDiv
GetCurrentDirectoryA
GetTempPathA
CreateDirectoryA
SetCurrentDirectoryA
SetFileAttributesA
DeleteFileA
CopyFileA
GetDriveTypeA
FindFirstFileA
FindClose
GetFileAttributesA
WriteFile
SetFilePointer
DeleteCriticalSection
lstrlenA
user32
GetForegroundWindow
GetWindowThreadProcessId
GetKeyboardState
GetAsyncKeyState
ShowWindow
BringWindowToTop
SetWindowPos
SetClassLongPtrA
RedrawWindow
GetWindowLongPtrA
WindowFromPoint
SendMessageA
GetKeyNameTextA
MapVirtualKeyA
PeekMessageA
RegisterHotKey
UnregisterHotKey
CharUpperA
CharLowerA
MessageBoxA
IsWindowVisible
IsWindowEnabled
EnableWindow
EnumWindows
BeginPaint
EndPaint
DefWindowProcA
LoadIconA
RegisterClassExA
CreateWindowExA
DestroyWindow
GetWindowTextLengthA
GetWindowTextA
GetWindowRect
GetParent
MapWindowPoints
MoveWindow
InvalidateRect
SetWindowTextA
SetFocus
GetSysColor
GetSysColorBrush
CallWindowProcA
GetDC
GetSystemMetrics
ReleaseDC
SetWindowLongPtrA
ScreenToClient
GetIconInfo
UpdateWindow
ReleaseCapture
DrawStateA
SetCapture
GetPropA
RemovePropA
SetPropA
TranslateMessage
DispatchMessageA
SetScrollPos
InflateRect
GetWindowDC
GetScrollPos
GetClientRect
SetScrollInfo
GetScrollRange
FillRect
LoadCursorA
GetWindow
SetActiveWindow
UnregisterClassA
DestroyAcceleratorTable
RegisterClassA
AdjustWindowRectEx
CreateAcceleratorTableA
MsgWaitForMultipleObjects
GetMessageA
GetActiveWindow
TranslateAcceleratorA
GetMenu
EnumChildWindows
GetFocus
PostMessageA
DefFrameProcA
IsChild
GetClassNameA
GetKeyState
RegisterWindowMessageA
GetCursorPos
OpenClipboard
EmptyClipboard
CloseClipboard
SetClipboardData
DrawIconEx
DestroyIcon
CopyImage
CreateIconFromResourceEx
CreateIconFromResource
gdi32
CreatePatternBrush
GetStockObject
SetTextColor
SetBkColor
SelectObject
GetTextExtentPoint32A
GetObjectType
GetObjectA
DeleteObject
ExcludeClipRect
CreateSolidBrush
GetDeviceCaps
CreateDCA
CreateFontA
DeleteDC
SetTextAlign
CreatePen
SetPixelV
Rectangle
RoundRect
Ellipse
SetROP2
SetBkMode
SelectPalette
RealizePalette
GetDIBits
CreateCompatibleDC
SetStretchBltMode
StretchDIBits
BitBlt
StretchBlt
MoveToEx
TextOutA
CreateFontIndirectA
GetPixel
ExtFloodFill
LineTo
GetTextMetricsA
CreateCompatibleBitmap
SetDIBits
GdiSetBatchLimit
GdiGetBatchLimit
SetBrushOrgEx
CreateDIBSection
CreateBitmap
SetPixel
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetCurrentHwProfileA
ole32
CoInitialize
CreateStreamOnHGlobal
GetHGlobalFromStream
OleInitialize
RevokeDragDrop
OleCreate
OleSetContainedObject
shell32
ShellExecuteExA
winmm
timeBeginPeriod
urlmon
URLDownloadToFileA
wininet
InternetGetConnectedState
comctl32
InitCommonControlsEx
oleaut32
SysAllocStringLen
SysAllocString
SysStringLen
SysFreeString
VariantInit
DispGetParam
VariantClear
Sections
.code Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 360KB - Virtual size: 360KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.pdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 304KB - Virtual size: 312KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ