Static task
static1
Behavioral task
behavioral1
Sample
4d7ee21a7d8d207c9da90d5ae6318798300c48e9cf5f0268708800ae986c2055_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
4d7ee21a7d8d207c9da90d5ae6318798300c48e9cf5f0268708800ae986c2055_NeikiAnalytics.exe
-
Size
756KB
-
MD5
ba61db1adf6a39c996ed4b8d153d3440
-
SHA1
84871b92d2f4f921c64be904187a40613be5b24a
-
SHA256
4d7ee21a7d8d207c9da90d5ae6318798300c48e9cf5f0268708800ae986c2055
-
SHA512
d99081ca15f953a7ddba7dfd94c6790f4c5e67b187663e89ee1ff78784f616bae2bfe3a5a938610f9e7d8d29457f4a580197d40fd4e7965fe9c6a4fb9babf6eb
-
SSDEEP
6144:RuJOoYdA8O83ArqFKfjjvbCEmIZ4jCK2CstFSQqDAOW8RIN5+N+smx:yuO83ArQKfjjeFC5AQUlR8+UN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d7ee21a7d8d207c9da90d5ae6318798300c48e9cf5f0268708800ae986c2055_NeikiAnalytics.exe
Files
-
4d7ee21a7d8d207c9da90d5ae6318798300c48e9cf5f0268708800ae986c2055_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
2d4db693163735d9717e180aca9565b4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteCriticalSection
VirtualAlloc
VirtualFree
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
CloseHandle
SetEvent
WaitForSingleObject
CreateEventA
Sleep
GetCurrentThreadId
SetLastError
CancelIo
ResetEvent
CreateEventW
lstrlenW
WideCharToMultiByte
GetFileAttributesA
GetExitCodeProcess
ResumeThread
CreateProcessA
GetThreadContext
SetThreadContext
OpenProcess
GetSystemDirectoryA
VirtualAllocEx
GetCurrentDirectoryA
CreateFileA
CreateFileW
GetFileSizeEx
WriteFile
IsDebuggerPresent
InitializeCriticalSectionEx
SetErrorMode
GetCurrentProcess
GetCurrentProcessId
CreateThread
CreateProcessW
GetStartupInfoW
GlobalMemoryStatusEx
GetSystemInfo
GetTickCount
GetTickCount64
FreeLibrary
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
LoadLibraryW
WinExec
MoveFileExA
GetConsoleWindow
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
ReadConsoleW
ReadFile
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
SetFilePointerEx
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
GetLastError
RaiseException
DecodePointer
GetFileAttributesExW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
WriteConsoleW
GetFileType
GetCommandLineW
GetCommandLineA
GetStdHandle
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
InitializeSListHead
TerminateProcess
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStringTypeW
OutputDebugStringW
QueryPerformanceCounter
GetSystemTimeAsFileTime
EncodePointer
CompareStringEx
MultiByteToWideChar
GetCPInfo
LCMapStringEx
user32
PostThreadMessageA
ShowWindow
GetInputState
GetCursorPos
advapi32
RegQueryValueExW
GetUserNameW
RegSetValueExW
RegOpenKeyExW
RegDeleteValueW
RegCreateKeyW
RegCloseKey
ws2_32
WSAIoctl
WSACleanup
socket
setsockopt
send
select
recv
htons
connect
closesocket
WSAStartup
gethostbyname
shlwapi
PathIsDirectoryA
winmm
timeGetTime
Sections
.text Size: 630KB - Virtual size: 630KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ