Static task
static1
Behavioral task
behavioral1
Sample
17a5361be238518cd2a7824813e3b63e20be85254a56a2fb43a75afd5c7806f4_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
17a5361be238518cd2a7824813e3b63e20be85254a56a2fb43a75afd5c7806f4_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
17a5361be238518cd2a7824813e3b63e20be85254a56a2fb43a75afd5c7806f4_NeikiAnalytics.exe
-
Size
31KB
-
MD5
131feb42383045e87b6ed3f56ec7c3a0
-
SHA1
1b63489bbc7bfd05886f4563858094750df4f22f
-
SHA256
17a5361be238518cd2a7824813e3b63e20be85254a56a2fb43a75afd5c7806f4
-
SHA512
3525d0b2b0b5c47796a4bceb6e1cff421bc654cb77abbc6043f11dbe34d1f80d25649ed85ca5fa55044bd7a2440ad9c12d0ad4a9df766f1ec91f09fc3c944ffd
-
SSDEEP
384:REdtQZ5GF6RwvLmuBYzELBbMYs1RW3X3X3X3X3X3X3X3X3X3X3X3X3X3X3X3X3XF:edBquBmEG1A
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 17a5361be238518cd2a7824813e3b63e20be85254a56a2fb43a75afd5c7806f4_NeikiAnalytics.exe
Files
-
17a5361be238518cd2a7824813e3b63e20be85254a56a2fb43a75afd5c7806f4_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
3a345473bf25100940219bad2239d430
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
GetModuleHandleA
GetSystemInfo
GetVersionExA
LocalAlloc
ExitProcess
user32
BeginPaint
CharUpperA
CreateDialogParamA
CreateWindowExA
DefWindowProcA
DispatchMessageA
EndDialog
EndPaint
FindWindowA
GetClassInfoExA
GetMessageA
GetSystemMetrics
GetTopWindow
LoadCursorA
LoadIconA
MessageBoxA
PostQuitMessage
RegisterClassExA
RegisterWindowMessageA
SendMessageA
SetDlgItemInt
SetFocus
SetWindowTextA
ShowWindow
TranslateMessage
UpdateWindow
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ