Static task
static1
Behavioral task
behavioral1
Sample
1e94b0fa8d8c50b4ed4e3b30e68f2864d0bbf1d2ce2d99ea54a7518c98b1e03e_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1e94b0fa8d8c50b4ed4e3b30e68f2864d0bbf1d2ce2d99ea54a7518c98b1e03e_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1e94b0fa8d8c50b4ed4e3b30e68f2864d0bbf1d2ce2d99ea54a7518c98b1e03e_NeikiAnalytics.exe
-
Size
320KB
-
MD5
c665e7c6496e7c555db3fc7306677320
-
SHA1
4150ef958c72fa0d2ba2b17099cd32d9a1097119
-
SHA256
1e94b0fa8d8c50b4ed4e3b30e68f2864d0bbf1d2ce2d99ea54a7518c98b1e03e
-
SHA512
a39c359606b1a2fe30f2fcf50bab90221035c02c40b8fc7edbc396232ee5b5ac5bccedd610ebd15d700d1350b23e4a9db607d895ec24739a6ae961016f46204e
-
SSDEEP
6144:kTwZo1IV3puaibGKFHi0mofhaH05kipz016580bHFbl86JQPDHDdx/QtqR:aXgvmzFHi0mo5aH0qMzd5807FRPJQPDV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1e94b0fa8d8c50b4ed4e3b30e68f2864d0bbf1d2ce2d99ea54a7518c98b1e03e_NeikiAnalytics.exe
Files
-
1e94b0fa8d8c50b4ed4e3b30e68f2864d0bbf1d2ce2d99ea54a7518c98b1e03e_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
a1161b9f4081312e64af594f73664c29
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiA
CreateThread
GetLogicalDriveStringsA
GetDriveTypeA
GetWindowsDirectoryA
MoveFileA
FreeLibrary
EnumResourceNamesA
LoadLibraryA
GetProcAddress
GetModuleHandleA
GetSystemInfo
GetVersionExA
SetThreadPriority
GetCurrentThread
FreeResource
UpdateResourceA
SizeofResource
LockResource
LoadResource
FindResourceA
EnumResourceLanguagesA
EndUpdateResourceA
BeginUpdateResourceA
CreateMutexA
GetLastError
WaitForSingleObject
GetVolumeInformationA
GetComputerNameA
GetCurrentProcess
OpenMutexA
SetPriorityClass
GetTempPathA
GetModuleFileNameA
GetSystemDirectoryA
SetErrorMode
InitializeCriticalSection
HeapAlloc
GetProcessHeap
HeapFree
WideCharToMultiByte
MultiByteToWideChar
ExitThread
GetTimeFormatA
GetDateFormatA
GetFileSize
SetFileAttributesA
GlobalUnlock
GlobalLock
GlobalAlloc
ExitProcess
SetFileTime
SystemTimeToFileTime
GetSystemTime
CreateDirectoryA
CreateProcessA
GetCurrentProcessId
SetEnvironmentVariableA
CompareStringW
CompareStringA
HeapSize
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
SetStdHandle
HeapReAlloc
GetLocaleInfoA
GetExitCodeProcess
GetStringTypeW
GetStringTypeA
VirtualFree
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
VirtualAlloc
VirtualProtect
GetCPInfo
FlushFileBuffers
GetOEMCP
GetACP
LCMapStringW
LCMapStringA
VirtualQuery
InterlockedExchange
RtlUnwind
TerminateProcess
GetCommandLineA
GetStartupInfoA
SetFilePointer
WriteFile
CreateFileA
ReadFile
CloseHandle
Sleep
FindFirstFileA
lstrcpyA
lstrcatA
lstrcmpA
GetTimeZoneInformation
EnterCriticalSection
LeaveCriticalSection
DeleteFileA
lstrcpynA
GetTickCount
GetFileAttributesA
lstrlenA
CopyFileA
FindNextFileA
FindClose
user32
TranslateMessage
GetMessageA
UpdateWindow
RegisterClassA
DispatchMessageA
wsprintfA
GetWindowRect
GetDesktopWindow
ShowWindow
EnableWindow
GetClassNameA
DestroyWindow
UnregisterClassA
PostMessageA
GetWindowThreadProcessId
GetWindowTextA
IsWindowVisible
EnumWindows
IsWindowEnabled
LookupIconIdFromDirectoryEx
GetCursorPos
SetCursorPos
GetSystemMetrics
ReleaseDC
GetWindowDC
SetClipboardData
EmptyClipboard
SendInput
SendMessageTimeoutA
RegisterWindowMessageA
SetWindowPos
PostQuitMessage
GetClientRect
GetWindowInfo
GetWindow
GetWindowPlacement
MessageBoxA
EnumChildWindows
SetWindowTextA
SetForegroundWindow
SetFocus
gdi32
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteDC
GetDIBits
DeleteObject
advapi32
SetSecurityDescriptorGroup
ChangeServiceConfigA
GetUserNameA
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
GetTokenInformation
SetFileSecurityA
SetSecurityDescriptorSacl
shell32
ShellExecuteA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
ws2_32
inet_addr
WSACreateEvent
WSAEventSelect
WSAWaitForMultipleEvents
WSAEnumNetworkEvents
WSACloseEvent
sendto
WSAGetLastError
gethostbyaddr
accept
getpeername
shutdown
inet_ntoa
select
__WSAFDIsSet
recv
send
closesocket
htons
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
rpcrt4
UuidCreate
UuidToStringA
RpcStringFreeA
Sections
.text Size: 164KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 136KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE