Static task
static1
Behavioral task
behavioral1
Sample
55c98514b01b970c1a216fd73ce5f400_NeikiAnalytics.exe
Resource
win7-20240729-en
General
-
Target
55c98514b01b970c1a216fd73ce5f400_NeikiAnalytics.exe
-
Size
819KB
-
MD5
55c98514b01b970c1a216fd73ce5f400
-
SHA1
6d03949535f4145e3d80780cac005053048618e1
-
SHA256
3a8471c413d01355761157dd92c7cc860d01856d5f8e4e09c1522447f1a93da5
-
SHA512
e8486f3062362c76e3e93790c77767542d85cfa64bb03f4cda4ea201722b9ba9cf63bff4e93d0e373314424b9626a5b0b7036ec0d7f093a7ea6a5a4016bd8ee1
-
SSDEEP
24576:97rzy0Xh9AbC7EOeBPOYMe3ercBRTWhKG:hrz1D7PIhleIB0hK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 55c98514b01b970c1a216fd73ce5f400_NeikiAnalytics.exe
Files
-
55c98514b01b970c1a216fd73ce5f400_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
1a6e62b0302084ec0fa5045481305262
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFullPathNameW
GetCurrentDirectoryW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetLastError
ReleaseMutex
CreateMutexW
DecodePointer
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
RaiseException
InitializeCriticalSectionAndSpinCount
GetFileSize
ReadFile
CreateFileW
MultiByteToWideChar
WideCharToMultiByte
GetSystemDirectoryW
GetVolumeInformationW
GetSystemInfo
GetVersionExW
GlobalAlloc
GlobalFree
OpenProcess
CreateProcessW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetLongPathNameW
FindClose
lstrcpyW
FindFirstFileW
FindNextFileW
GetTickCount
WriteFile
GetTempPathW
DeleteFileW
CopyFileW
MoveFileExW
GetWindowsDirectoryW
VirtualProtect
SetErrorMode
GetLocalTime
LoadLibraryW
OutputDebugStringA
SetPriorityClass
CreateDirectoryW
VirtualAlloc
VirtualFree
SetLastError
GetNativeSystemInfo
LoadLibraryA
IsBadReadPtr
RtlUnwind
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
GetACP
GetFileType
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
OutputDebugStringW
WaitForSingleObjectEx
SetStdHandle
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetConsoleCP
GetTimeZoneInformation
FlushFileBuffers
WriteConsoleW
SetEndOfFile
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FreeLibraryAndExitThread
GetProcAddress
FreeLibrary
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileIntW
GetModuleFileNameW
CreateEventW
CloseHandle
Sleep
WaitForSingleObject
SetEvent
GetExitCodeThread
TerminateThread
CreateThread
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
ExitThread
ExpandEnvironmentStringsW
PeekNamedPipe
WaitForMultipleObjects
GetSystemDirectoryA
DeviceIoControl
InitializeCriticalSection
SleepEx
ResetEvent
FormatMessageW
shell32
SHGetSpecialFolderPathW
SHGetFolderPathW
shlwapi
PathRemoveFileSpecW
PathFileExistsW
user32
wsprintfW
advapi32
RevertToSelf
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyW
RegEnumKeyW
RegCreateKeyExW
RegCloseKey
ImpersonateLoggedOnUser
OpenProcessToken
DuplicateTokenEx
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
ole32
CoCreateInstance
CoUninitialize
CoInitialize
iphlpapi
GetAdaptersInfo
wininet
InternetSetOptionW
HttpQueryInfoW
InternetCloseHandle
InternetOpenUrlW
InternetOpenW
InternetReadFile
ws2_32
ioctlsocket
gethostname
listen
accept
WSAStartup
WSACleanup
closesocket
socket
WSAGetLastError
recv
send
bind
connect
getpeername
getsockname
getsockopt
htons
ntohs
setsockopt
WSASetLastError
htonl
inet_addr
inet_ntoa
gethostbyaddr
gethostbyname
getservbyport
getservbyname
__WSAFDIsSet
select
recvfrom
sendto
Sections
.text Size: 561KB - Virtual size: 561KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 444B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 97KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE