Static task
static1
Behavioral task
behavioral1
Sample
2174fc448902c5b92a5257a52ac80da37888be7e7f38bd505290289a23575ac6_NeikiAnalytics.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2174fc448902c5b92a5257a52ac80da37888be7e7f38bd505290289a23575ac6_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
2174fc448902c5b92a5257a52ac80da37888be7e7f38bd505290289a23575ac6_NeikiAnalytics.exe
-
Size
281KB
-
MD5
86776557610474bc0c02ea10a8482000
-
SHA1
0f36d22f3be859305b0d53fcefecd1c73b68ee76
-
SHA256
2174fc448902c5b92a5257a52ac80da37888be7e7f38bd505290289a23575ac6
-
SHA512
32bef4dcfa03fb29ba77e383d239c6ac7b796fde107d106efd690690f13b4e6d5e0678bf0607b6802643ef6241d018747c2028e9ac8d65c4ea7654fda5d556b9
-
SSDEEP
6144:zAK4y6UvcZSeNH49qQQOH+ym4LLIoTqnQSMax0:cK4yjNQOGzoTFSMh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2174fc448902c5b92a5257a52ac80da37888be7e7f38bd505290289a23575ac6_NeikiAnalytics.exe
Files
-
2174fc448902c5b92a5257a52ac80da37888be7e7f38bd505290289a23575ac6_NeikiAnalytics.exe.dll windows:5 windows x86 arch:x86
3b6991bb3550c553a492c84f28d038f4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
winscard
SCardFreeMemory
SCardReleaseContext
SCardEstablishContext
SCardConnectA
SCardListReadersA
sensapi
IsNetworkAlive
iphlpapi
GetTcpTable
dbghelp
SymGetSymFromAddr
SymSetOptions
SymGetModuleBase
SymInitialize
SymGetModuleInfo
msvcrt
fclose
fseek
realloc
fwrite
fread
fopen
strncpy
malloc
calloc
free
sprintf
_except_handler3
atoi
isprint
strstr
_snprintf
memcpy
memset
psapi
GetModuleFileNameExA
netapi32
NetQueryDisplayInformation
NetApiBufferFree
dnsapi
DnsFlushResolverCache
wininet
HttpAddRequestHeadersW
HttpAddRequestHeadersA
InternetSetStatusCallback
InternetQueryOptionA
InternetConnectA
InternetReadFile
HttpOpenRequestA
InternetCheckConnectionA
HttpSendRequestA
InternetOpenA
InternetCloseHandle
HttpQueryInfoA
ws2_32
gethostbyname
send
listen
accept
socket
WSASetLastError
inet_addr
closesocket
ntohs
bind
select
setsockopt
htonl
getpeername
gethostname
connect
inet_ntoa
WSAStartup
htons
shutdown
recv
WSAGetLastError
__WSAFDIsSet
recvfrom
shell32
ExtractIconExA
SHFileOperationA
ord680
ShellExecuteA
SHGetFolderPathA
shlwapi
StrCmpNIA
StrToIntA
PathAppendA
PathGetDriveNumberA
StrStrIW
PathAddBackslashA
PathFindFileNameA
StrStrIA
StrNCatA
StrStrA
StrChrIA
PathFileExistsA
PathMakeSystemFolderA
ntdll
RtlImageNtHeader
RtlCreateUserThread
ZwQueryInformationThread
kernel32
GetComputerNameA
lstrlenA
GetVersionExA
ResetEvent
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GlobalLock
OpenFileMappingA
GlobalUnlock
GlobalFree
SetErrorMode
GetDriveTypeA
SetCurrentDirectoryA
GetLogicalDriveStringsA
CopyFileA
GetTempFileNameA
GetCurrentDirectoryA
GetTempPathA
GlobalAlloc
lstrcmpiW
GetProcessHeap
HeapValidate
CreateEventA
SetThreadPriority
FileTimeToSystemTime
GetSystemTime
LocalFree
GetFileInformationByHandle
GetFileType
LocalAlloc
GetLocalTime
SystemTimeToFileTime
SetFilePointer
GetFileSize
FileTimeToDosDateTime
WriteProcessMemory
Module32Next
VirtualAllocEx
Module32First
GetProcessTimes
CreateRemoteThread
VirtualQuery
GetPrivateProfileStringA
GetShortPathNameA
GetFileAttributesW
GetFileAttributesA
GetVersionExW
WideCharToMultiByte
VirtualProtect
GetThreadPriority
InterlockedExchange
FlushInstructionCache
lstrcmpA
FindFirstChangeNotificationA
FindNextChangeNotification
TerminateThread
WinExec
MoveFileA
ExitThread
GetCommandLineA
GetLastError
SetLastError
GetProcAddress
GetModuleFileNameA
GetModuleHandleA
GetTickCount
GetVolumeInformationA
GetEnvironmentVariableA
CreateMutexA
GetCurrentProcess
GetTimeFormatA
GetCurrentThread
VirtualFree
GetDateFormatA
VirtualAlloc
AddVectoredExceptionHandler
DeleteFileA
GetSystemDefaultLangID
Process32First
OpenProcess
GetSystemWindowsDirectoryA
GetTimeZoneInformation
Process32Next
CreateToolhelp32Snapshot
CloseHandle
WaitForSingleObject
LoadLibraryExA
ReleaseMutex
CreateFileA
MoveFileExA
lstrcpynA
SetEndOfFile
SetFilePointerEx
WriteFile
IsBadWritePtr
ReadFile
CreateDirectoryA
GetFileSizeEx
FindFirstFileA
RemoveDirectoryA
SetFileAttributesA
FindClose
FindNextFileA
HeapReAlloc
HeapAlloc
HeapFree
ExitProcess
SetEvent
Sleep
OpenMutexA
GetCurrentThreadId
GetCurrentProcessId
lstrcpyA
MapViewOfFile
UnmapViewOfFile
IsBadReadPtr
CreateFileMappingA
CreateProcessA
CreateThread
HeapCreate
lstrcmpiA
OpenEventA
GetCommandLineW
user32
GetWindowDC
MsgWaitForMultipleObjects
TranslateMessage
PeekMessageW
DispatchMessageW
FindWindowW
ToAscii
GetKeyboardState
GetGUIThreadInfo
GetWindowTextA
CharUpperA
GetSystemMetrics
GetDC
SetCaretBlinkTime
SetThreadDesktop
GetThreadDesktop
ReleaseDC
GetShellWindow
GetWindow
DestroyIcon
FindWindowA
GetDesktopWindow
GetIconInfo
RegisterWindowMessageA
SendMessageA
WindowFromPoint
DrawIcon
CreateDesktopA
GetTopWindow
IsWindowVisible
PostMessageA
IsWindow
MapVirtualKeyA
IsIconic
IsRectEmpty
GetClassLongA
GetWindowThreadProcessId
MapWindowPoints
GetMenuItemInfoA
SetWindowPos
SendMessageTimeoutA
GetWindowLongA
GetAncestor
GetWindowInfo
GetParent
GetWindowRect
GetSystemMenu
DefWindowProcW
EndMenu
HiliteMenuItem
DefMDIChildProcA
GetCursor
GetMenuItemCount
DefMDIChildProcW
DefWindowProcA
GetMenuState
CopyIcon
TrackPopupMenuEx
GetMenuItemRect
GetMenu
MenuItemFromPoint
GetActiveWindow
SetKeyboardState
GetMenuItemID
OpenDesktopA
PrintWindow
WindowFromDC
SetLayeredWindowAttributes
EnumChildWindows
RedrawWindow
GetWindowRgn
SetClassLongA
SetWindowLongA
GetScrollBarInfo
MoveWindow
DialogBoxIndirectParamA
SetWindowTextA
ShowWindow
EndDialog
GetDlgItem
CreateWindowExA
GetWindowTextLengthA
GetClientRect
LoadIconA
AttachThreadInput
DestroyWindow
wsprintfA
GetUserObjectInformationA
PtInRect
GetFocus
GetLastActivePopup
RealChildWindowFromPoint
GetClassNameA
GetCursorPos
GetWindowTextW
GetOpenClipboardWindow
GetSubMenu
gdi32
GetViewportOrgEx
BitBlt
GetClipRgn
GetObjectA
CreateFontIndirectA
SetViewportOrgEx
CreateRectRgn
DeleteDC
CreateDIBSection
GetDIBits
GdiFlush
CreateCompatibleBitmap
SelectClipRgn
DeleteObject
SelectObject
CreateCompatibleDC
OffsetRgn
GetDeviceCaps
advapi32
RegDeleteValueA
RegDeleteKeyA
GetUserNameA
RegCloseKey
GetTokenInformation
OpenProcessToken
RegNotifyChangeKeyValue
RegFlushKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegEnumKeyExA
Sections
.text Size: 229KB - Virtual size: 229KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ