Static task
static1
Behavioral task
behavioral1
Sample
b54bb89488feb4c462931bf7d9385db403cd244f1a2da9f409f1689b4a637851_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
b54bb89488feb4c462931bf7d9385db403cd244f1a2da9f409f1689b4a637851_NeikiAnalytics.exe
-
Size
2.6MB
-
MD5
488db4af42d10cc4ed4145fc4d67a360
-
SHA1
0860538deaba5609880149f4bc8dad2bf2e72879
-
SHA256
b54bb89488feb4c462931bf7d9385db403cd244f1a2da9f409f1689b4a637851
-
SHA512
85760caddfc94a6219d05fce6579e216a8d133f1c6f1f1ddbc53bc1d30d7b636c09c7d4cd600f458cdde917aba6f51964cd8a8a315584b0017c9dac901a03c0e
-
SSDEEP
49152:wTETi+ogfUbmWsoBLlg8iQ5baGo+Gc6+3P39hqvHtZsxP5kk:wcogN0LyQ5bxo3Wq7sxt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource b54bb89488feb4c462931bf7d9385db403cd244f1a2da9f409f1689b4a637851_NeikiAnalytics.exe
Files
-
b54bb89488feb4c462931bf7d9385db403cd244f1a2da9f409f1689b4a637851_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
67b0bcf3e6b1c9e3fa205685c61e0a2f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempPathA
GetVersionExA
GetShortPathNameW
WideCharToMultiByte
FindClose
FindFirstFileA
GetComputerNameA
CloseHandle
CreateFileA
GetLastError
FindNextFileA
GetModuleHandleA
GetModuleFileNameA
OutputDebugStringA
LeaveCriticalSection
GetProcAddress
LoadLibraryA
InitializeCriticalSection
SetEnvironmentVariableA
DeleteCriticalSection
LoadLibraryExA
LockResource
LoadResource
FindResourceA
SetLastError
VirtualProtect
VirtualFree
VirtualAlloc
MultiByteToWideChar
ExitThread
FreeLibrary
EnterCriticalSection
user32
MessageBoxA
advapi32
GetUserNameA
msvcrt
localtime
vsprintf
free
malloc
strcmp
fprintf
_iob
fclose
strlen
fgets
fopen
sprintf
strcat
strcpy
getenv
wcslen
memcpy
memcmp
strchr
strstr
time
_ftol
_stat
atol
_pctype
_isctype
__mb_cur_max
atoi
fwrite
rand
srand
_close
_futime
_open_osfhandle
_errno
fread
strncpy
fflush
fputc
fputs
_rmdir
__p__environ
memset
perror
abort
_setjmp3
toupper
memmove
strrchr
wcscmp
_exit
_strdup
_mkdir
_getpid
_chmod
_strnicmp
_dup2
_fileno
_putenv
_initterm
_unlink
_stricmp
__dllonexit
_onexit
_adjust_fdiv
_XcptFilter
exit
__p___initenv
__getmainargs
__set_app_type
__setusermatherr
__p__commode
__p__fmode
_controlfp
_except_handler3
calloc
Sections
.text Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zqbwkrz Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rmnet Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE