Static task
static1
Behavioral task
behavioral1
Sample
4c0eb29a648e2cc7f3ab7856cc607784322c8936c3020aeb53d0f7cd8142b641_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4c0eb29a648e2cc7f3ab7856cc607784322c8936c3020aeb53d0f7cd8142b641_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
4c0eb29a648e2cc7f3ab7856cc607784322c8936c3020aeb53d0f7cd8142b641_NeikiAnalytics.exe
-
Size
173KB
-
MD5
b1fe2162aabdeb626776d4bd7bd19ae0
-
SHA1
b0dfcfc66a640cdac8936b5a5506838e312395c4
-
SHA256
4c0eb29a648e2cc7f3ab7856cc607784322c8936c3020aeb53d0f7cd8142b641
-
SHA512
b80a384963ee54179db065a38cbb2473874747d099dd59e2de6c87b1806619dfe4bd2914b83276d266188831e9780d5af4df41e60ae512a594e0182a23187bb5
-
SSDEEP
1536:loA3+Lrh/EZR+cmqQkZ7B4AZ7B4MCOZ7B4GGHHDrOZpuFHU91JzZcIyVRMGIkioK:2ZL9/EZqjIyHUJzo9Ikojv
Malware Config
Signatures
Files
-
4c0eb29a648e2cc7f3ab7856cc607784322c8936c3020aeb53d0f7cd8142b641_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
c5bf6e8ec3437d1595b2b17769bcbb8d
Code Sign
06:16:30:c2:c6:8f:79:4a:b8:2d:e3:fa:e2:24:0b:22Certificate
IssuerCN=USURA Core CA,L=BS-0003-AX,C=AQ,1.2.840.113549.1.9.1=#0c176c696e64616f6e656573616d6140676d61696c2e636f6dNot Before01/11/2019, 11:08Not After30/12/2269, 21:00SubjectCN=USURA Core CA,L=BS-0003-AX,C=AQ,1.2.840.113549.1.9.1=#0c176c696e64616f6e656573616d6140676d61696c2e636f6d51:0e:cd:57:0e:a0:cd:ae:40:7e:1c:f3:02:b4:90:82Certificate
IssuerCN=USURA Core CA,L=BS-0003-AX,C=AQ,1.2.840.113549.1.9.1=#0c176c696e64616f6e656573616d6140676d61696c2e636f6dNot Before01/11/2019, 11:09Not After30/12/2269, 21:00SubjectCN=USURA Interface CA,L=BS-0003-AX,C=AQ,1.2.840.113549.1.9.1=#0c176c696e64616f6e656573616d6140676d61696c2e636f6d6e:2c:42:90:89:07:57:97:45:e2:5e:58:dc:e3:d7:55Certificate
IssuerCN=USURA Interface CA,L=BS-0003-AX,C=AQ,1.2.840.113549.1.9.1=#0c176c696e64616f6e656573616d6140676d61696c2e636f6dNot Before01/11/2019, 11:19Not After30/12/2269, 21:00SubjectCN=Линда Кайе,OU=Отдел сотворения,O=HalfMoon Studios,L=Лингрин,ST=Северный сегмент,C=MI,1.2.840.113549.1.9.1=#0c176c696e64616f6e656573616d6140676d61696c2e636f6d,2.5.4.12=#0c1bd0a1d0bed0b7d0b4d0b0d182d0b5d0bbd18c20d0bcd0b8d180d0b030:0f:6f:ac:dd:66:98:74:7c:a9:46:36:a7:78:2d:b9Certificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02/05/2019, 00:00Not After18/01/2038, 23:59SubjectCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
8c:77:a0:00:8f:f4:d1:b0:c6:3d:9f:3a:48:83:8d:6bCertificate
IssuerCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before23/10/2020, 00:00Not After22/01/2032, 23:59SubjectCN=Sectigo RSA Time Stamping Signer #2,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetActiveWindow
comctl32
InitCommonControls
ajpappssupport0100
asGetCurrentDirectory
asOpenReadMeFile
asGetFullFileName
asSetWindowResIconAll
asHighlightText
asFormatLong
asLoadResIconSmall
asGetThunderMainHandle
asSetMenuJustify
asFixUserControlsContainerWindow
asCenterFormEx
asGetFileName
asGetFilePath
asUnloadForm
asIsInIDE
asRegisterAppPath
msvbvm60
__vbaVarTstGt
__vbaVarSub
__vbaStrI2
_CIcos
_adj_fptan
__vbaVarMove
__vbaStrI4
__vbaHresultCheck
__vbaFreeVar
__vbaStrVarMove
__vbaLenBstr
__vbaLateIdCall
__vbaFreeVarList
_adj_fdiv_m64
__vbaFreeObjList
_adj_fprem1
__vbaStrCat
__vbaHresultCheckObj
__vbaLenVar
ord665
_adj_fdiv_m32
__vbaAryVar
__vbaAryDestruct
__vbaLateMemSt
__vbaForEachCollObj
__vbaExitProc
__vbaObjSet
__vbaOnError
ord595
_adj_fdiv_m16i
__vbaObjSetAddref
_adj_fdivr_m16i
ord598
__vbaForEachCollVar
_CIsin
__vbaErase
__vbaNextEachCollObj
__vbaVarZero
__vbaChkstk
EVENT_SINK_AddRef
__vbaGenerateBoundsError
__vbaExitEachColl
__vbaStrCmp
__vbaVarTstEq
__vbaNextEachCollVar
__vbaI2I4
__vbaObjVar
__vbaVarLateMemSt
ord670
__vbaCastObjVar
__vbaLbound
_adj_fpatan
__vbaR4Var
__vbaLateIdCallLd
__vbaRedim
EVENT_SINK_Release
__vbaNew
_CIsqrt
__vbaObjIs
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
_adj_fprem
_adj_fdivr_m64
__vbaLateIdStAd
ord716
__vbaFPException
ord717
ord319
__vbaUbound
__vbaStrVarVal
__vbaVarCat
__vbaI2Var
_CIlog
__vbaErrorOverflow
__vbaVarLateMemCallLdRf
__vbaNew2
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
ord681
__vbaFreeStrList
_adj_fdivr_m32
_adj_fdiv_r
ord685
ord100
__vbaVarTstNe
__vbaI4Var
__vbaLateMemCall
ord320
__vbaVarDup
ord321
__vbaVerifyVarObj
__vbaVarLateMemCallLd
__vbaFpI4
__vbaLateMemCallLd
ord617
_CIatan
__vbaAryCopy
__vbaCastObj
__vbaStrMove
ord619
_allmul
__vbaLateIdSt
__vbaLateMemCallSt
_CItan
_CIexp
__vbaFreeStr
__vbaFreeObj
Sections
.text Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ