Static task
static1
Behavioral task
behavioral1
Sample
b51b1a0c5fc953d064a352266f814a4ab0af68501d289dab20396225c90a56eb_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b51b1a0c5fc953d064a352266f814a4ab0af68501d289dab20396225c90a56eb_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
b51b1a0c5fc953d064a352266f814a4ab0af68501d289dab20396225c90a56eb_NeikiAnalytics.exe
-
Size
384KB
-
MD5
1548cb99b3b25be6aecca46f70c24aa0
-
SHA1
83b8e6db8b1cbc5e3bd45becb8e82abc4d46c9f1
-
SHA256
b51b1a0c5fc953d064a352266f814a4ab0af68501d289dab20396225c90a56eb
-
SHA512
1fd010bd3e0e3cb2f99a4f68a1ac12682733b360932a32447275eef04a1348d5de4f3f82213e7d6c71c9fe97ed4ce4fb04bf7620e3820792b36628ace40af24b
-
SSDEEP
6144:grTjen1clbwUkoCmVjnGpFLWC8b2FFANt:gTdEUkLijnGpFLWC88FAN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b51b1a0c5fc953d064a352266f814a4ab0af68501d289dab20396225c90a56eb_NeikiAnalytics.exe
Files
-
b51b1a0c5fc953d064a352266f814a4ab0af68501d289dab20396225c90a56eb_NeikiAnalytics.exe.exe windows:5 windows x64 arch:x64
d8fa01104f250d2c621166eaa9daa133
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapCreate
GetVersion
HeapSetInformation
FlsAlloc
LeaveCriticalSection
GetCurrentThreadId
SetLastError
FlsFree
FlsSetValue
FlsGetValue
EncodePointer
DeleteCriticalSection
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
EnterCriticalSection
LoadLibraryW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapFree
Sleep
HeapSize
MultiByteToWideChar
LCMapStringW
GetStringTypeW
HeapAlloc
CreateMutexA
GetModuleFileNameA
ExitProcess
GetLastError
GetEnvironmentStringsW
WideCharToMultiByte
GetCommandLineA
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetProcAddress
GetModuleHandleW
DecodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
RtlUnwindEx
VirtualAlloc
HeapReAlloc
user32
GetMessageA
TranslateMessage
DispatchMessageA
DestroyMenu
PostQuitMessage
TrackPopupMenu
LoadIconA
RegisterClassExA
CreateWindowExA
ShowWindow
UpdateWindow
SetForegroundWindow
KillTimer
SetTimer
LoadCursorA
SetCursor
DestroyWindow
DefWindowProcA
ShowCursor
LoadMenuA
GetSubMenu
SetMenuDefaultItem
EnableMenuItem
CheckMenuItem
wsprintfA
EnumWindows
GetClassNameA
BeginPaint
EndPaint
GetDC
MessageBoxA
SendMessageA
ReleaseDC
InvalidateRect
ValidateRect
GetSystemMetrics
LoadBitmapA
GetCursorPos
gdi32
GdiFlush
StretchBlt
CreatePen
MoveToEx
LineTo
CreateDCA
CreateCompatibleBitmap
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
SelectObject
GetObjectA
GetStockObject
advapi32
RegDeleteValueA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
shell32
Shell_NotifyIconA
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 54KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 178KB - Virtual size: 178KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ