Static task
static1
Behavioral task
behavioral1
Sample
a9b000bd7563ebd925be6924d7363be84c882b3eade51420baa154156837c04c_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a9b000bd7563ebd925be6924d7363be84c882b3eade51420baa154156837c04c_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
a9b000bd7563ebd925be6924d7363be84c882b3eade51420baa154156837c04c_NeikiAnalytics.exe
-
Size
244KB
-
MD5
fe90ef9fce7af5c7bc645f8da4ee2700
-
SHA1
88b624382b605c456f4f9cba3489c5a11a68d175
-
SHA256
a9b000bd7563ebd925be6924d7363be84c882b3eade51420baa154156837c04c
-
SHA512
29eb668ca25b4283c7f1148f81478d1622b51d95e60f272dde8653c3462818c26339bd33075887e402c89630c8670b4bb86c6fe3aa1b09273eb49c47e4692137
-
SSDEEP
6144:jEXlSylvFuWaS54hIAv/QhuA7HY8pPZ0FP6BzxM5EmX:kAylvv5YRwh9HYd61xhmX
Malware Config
Signatures
Files
-
a9b000bd7563ebd925be6924d7363be84c882b3eade51420baa154156837c04c_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
25724a12bec6f765c371201f99ac92be
Code Sign
a0:21:84:d7:75:ec:3c:ea:aa:63:97:b4:86:40:49:d6:b8:9e:37:c4Signer
Actual PE Digesta0:21:84:d7:75:ec:3c:ea:aa:63:97:b4:86:40:49:d6:b8:9e:37:c4Digest Algorithmsha1PE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNumberFormatA
SetEvent
FindResourceA
GetExpandedNameW
GetFileTime
RaiseException
GetTempPathW
FileTimeToDosDateTime
GetStringTypeA
SearchPathW
GetTempPathA
GetFileAttributesW
SetCalendarInfoA
GetVersion
CreateMailslotW
lstrlenA
EnumTimeFormatsW
VirtualAlloc
EnumCalendarInfoA
GetEnvironmentStringsW
SetLastError
GetCurrentProcess
ConnectNamedPipe
GetModuleFileNameW
lstrcpynA
GetCurrentThread
WaitForSingleObject
GlobalGetAtomNameA
OpenFile
GetTempFileNameW
ReplaceFileA
OpenMutexW
CreateDirectoryA
AddAtomW
GetCurrentProcessId
GetStringTypeW
OpenMutexA
GetLongPathNameA
CreateFiber
GetCurrentDirectoryW
CreateEventA
SystemTimeToFileTime
GlobalDeleteAtom
InitializeCriticalSection
SuspendThread
GetDiskFreeSpaceW
GetCurrentThreadId
CreateThread
SetComputerNameW
IsBadStringPtrA
user32
InsertMenuItemW
ChildWindowFromPoint
GetMessageA
GetWindowRgn
DrawTextW
GetDC
IsDlgButtonChecked
GetClassInfoA
LoadCursorA
CreateDialogParamW
CheckRadioButton
SetCursorPos
LoadImageA
SetWindowLongA
LoadMenuIndirectA
SetCapture
CreateMenu
EnableMenuItem
CharNextW
CheckDlgButton
OpenWindowStationA
gdi32
GetColorSpace
DeleteColorSpace
GetKerningPairsA
CreateMetaFileA
ColorCorrectPalette
GetCharWidthI
GetTextExtentExPointW
GetDCOrgEx
EnumFontFamiliesExW
GetClipRgn
GetCharWidth32W
CombineRgn
GetEnhMetaFileDescriptionA
SelectObject
UpdateICMRegKeyA
GetClipBox
CreateDIBPatternBrushPt
GetTextMetricsW
advapi32
IsValidAcl
RegDeleteValueW
RegRestoreKeyA
RegOpenKeyW
ole32
CoGetPSClsid
CoDeactivateObject
OleCreateEx
CLSIDFromProgID
CoGetCallerTID
OleUninitialize
CreateFileMoniker
Sections
.<9;kn% Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.E Size: 1KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0<+' Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.< Size: 1024B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.FpFJb Size: 3KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.(c1$7 Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 212KB - Virtual size: 211KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ