Static task
static1
Behavioral task
behavioral1
Sample
b0e2b563a398893045360102d875116828b8851e54c291a3ed2aae1936d67119_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b0e2b563a398893045360102d875116828b8851e54c291a3ed2aae1936d67119_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
b0e2b563a398893045360102d875116828b8851e54c291a3ed2aae1936d67119_NeikiAnalytics.exe
-
Size
130KB
-
MD5
30eb5f8f65af4b0ce4eccaf3be8c6050
-
SHA1
9b0f2ccde883b9f0d2dc37a16df7c7b0fac2b57b
-
SHA256
b0e2b563a398893045360102d875116828b8851e54c291a3ed2aae1936d67119
-
SHA512
91d6b12f7fd56c7de5f80bf9f9b5ea13d9817ef7786a2078527f38581ad2c0ea71ddd5862f872fa261e9e8606c60803e6b3dea16935a8a47f7ab7e7787f8d472
-
SSDEEP
3072:nJCD54/JTNWLQx7pMvifuWI9LJdZtg86WkUOwLNot4:YUAifuWI91r96cryt4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b0e2b563a398893045360102d875116828b8851e54c291a3ed2aae1936d67119_NeikiAnalytics.exe
Files
-
b0e2b563a398893045360102d875116828b8851e54c291a3ed2aae1936d67119_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
ea23fc29d95be057d4e7c6b77d74a60d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord626
ord595
ord598
ord526
EVENT_SINK_AddRef
ord528
ord529
DllFunctionCall
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord608
ord716
ProcCallEngine
ord535
ord645
ord570
ord571
ord576
ord100
ord617
ord581
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cpa Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adate Size: 10KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE