Static task
static1
Behavioral task
behavioral1
Sample
0b3dfd0fdf6db9a8e808f46577095802d2a33179c587786b7e3d70db53cf7efa_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0b3dfd0fdf6db9a8e808f46577095802d2a33179c587786b7e3d70db53cf7efa_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
0b3dfd0fdf6db9a8e808f46577095802d2a33179c587786b7e3d70db53cf7efa_NeikiAnalytics.exe
-
Size
25KB
-
MD5
9379bda3612faffc75f128b24e4727a0
-
SHA1
66dd6d0453d9d0bb88892edec3ed7ad071872bab
-
SHA256
0b3dfd0fdf6db9a8e808f46577095802d2a33179c587786b7e3d70db53cf7efa
-
SHA512
df213cca2a035bf29756bcc01c75e817474328ba97fd71b28b261bf538c405b00c8d75525ec2dcad576b47580a4e4eb726dec1db3bfbac83f7c7405c7eef86cb
-
SSDEEP
384:3xsyJgcpztAilFnRbKJJmnsxnKxfMTsFGr3ezYj3RdVTMmosR0/6xw:31gcpzRXnnonKOTqGiUjpTMmBw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b3dfd0fdf6db9a8e808f46577095802d2a33179c587786b7e3d70db53cf7efa_NeikiAnalytics.exe
Files
-
0b3dfd0fdf6db9a8e808f46577095802d2a33179c587786b7e3d70db53cf7efa_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
4b81ee2e747dac86cbf875d007b416b2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DefWindowProcA
GetClientRect
GetSystemMetrics
BeginPaint
GetSysColor
SetWindowWord
SetRect
EndPaint
RegisterClassA
UpdateWindow
GetWindowWord
LoadCursorA
OemToCharA
OemToCharBuffA
EnableWindow
SetWindowTextA
SendMessageA
ShowWindow
PostMessageA
GetLastActivePopup
KillTimer
SetTimer
GetWindowRect
DialogBoxIndirectParamA
SetCursor
SetWindowPos
GetDlgItemTextA
EndDialog
GetKeyState
PeekMessageA
TranslateMessage
DispatchMessageA
GetParent
SetDlgItemTextA
SendDlgItemMessageA
GetDlgItem
InvalidateRect
wsprintfA
MessageBoxA
kernel32
CreateDirectoryA
_lwrite
RtlUnwind
SetFileTime
GetModuleHandleA
SetErrorMode
GetCommandLineA
GetTempPathA
GetModuleFileNameA
GetVersion
GetWindowsDirectoryA
LocalFree
GlobalUnlock
LocalAlloc
GlobalFree
GlobalAlloc
GlobalHandle
GetProfileStringA
lstrcmpiA
GlobalLock
_llseek
_lclose
WinExec
lstrlenA
_lread
_lopen
FindClose
FindFirstFileA
SetCurrentDirectoryA
_lcreat
lstrcpyA
lstrcatA
LocalFileTimeToFileTime
DosDateTimeToFileTime
gdi32
SetBkColor
SetTextAlign
GetTextExtentPoint32A
GetBkColor
SetTextColor
DeleteObject
ExtTextOutA
CreateDCA
GetDeviceCaps
CreateFontIndirectA
DeleteDC
SelectObject
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 147B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
_winzip_ Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ