Behavioral task
behavioral1
Sample
a1ad3757c6f8291d4abe4e1a2e5af6bf4472276c186a6b72d53634d36b4fbe70_NeikiAnalytics.exe
Resource
win7-20240611-en
General
-
Target
a1ad3757c6f8291d4abe4e1a2e5af6bf4472276c186a6b72d53634d36b4fbe70_NeikiAnalytics.exe
-
Size
3.0MB
-
MD5
c6ed6b009d3d4f3da2ebfbc4fc7b61b0
-
SHA1
3c7db177af90e8680ded092d7e1d875c55fd5150
-
SHA256
a1ad3757c6f8291d4abe4e1a2e5af6bf4472276c186a6b72d53634d36b4fbe70
-
SHA512
813aa7d3ebb3fa16f567de097edb48f8c9c86001fbd85131e317760ad4618e1cd0d432ea257e00e65ecf14bb3d92bd422ac955cd37352d0ac98dc19ce604b5ea
-
SSDEEP
49152:LUGcKAppdT0Cu4kvTHPcgSmgHg0difh01KSz1y2XPM0W0tN2OycQQFPz31Vk:YGLoZ0CJSYg4g0e8dUB8cOycQQp7j
Malware Config
Signatures
-
resource yara_rule sample themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a1ad3757c6f8291d4abe4e1a2e5af6bf4472276c186a6b72d53634d36b4fbe70_NeikiAnalytics.exe
Files
-
a1ad3757c6f8291d4abe4e1a2e5af6bf4472276c186a6b72d53634d36b4fbe70_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
Size: 3KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.themida Size: - Virtual size: 4.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 3.0MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ