c:\devel\Bandizip5\bin\bdzsfx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1b04997de9a039b6b0eea0b255e2b840_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1b04997de9a039b6b0eea0b255e2b840_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
1b04997de9a039b6b0eea0b255e2b840_NeikiAnalytics
-
Size
285KB
-
MD5
1b04997de9a039b6b0eea0b255e2b840
-
SHA1
abb6c2f05405760fe2168f17ea720a706b70c7e5
-
SHA256
3952a7a03cfea5324a77d6bf8a8690eab2300dbe88a6234d66a2d3a1c8518531
-
SHA512
7ace055aaddbae33ab571875ab2215551a662a1ce73a389dfd1492d58615902881e7e95727d01a3de8b504208c2317c0c339e94d78d37e13148ca44deb4e20f7
-
SSDEEP
6144:bw/h/w9qTrSYhEjkB4LrxLT4TBMWrkIdBV+UdvrEFp7hK6z:bKhwqBekB4L134TXkIdBjvrEH77
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b04997de9a039b6b0eea0b255e2b840_NeikiAnalytics
Files
-
1b04997de9a039b6b0eea0b255e2b840_NeikiAnalytics.exe windows:5 windows x86 arch:x86
3d1f548c6b3070f2a6a1b633df0aaac3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrcatW
GetFileAttributesA
GetFileAttributesW
lstrlenA
lstrcpyW
WideCharToMultiByte
SetFileAttributesW
GetFileSize
CreateFileW
GetCurrentThread
SetFileTime
FileTimeToSystemTime
GetTimeZoneInformation
SystemTimeToTzSpecificLocalTime
VirtualAlloc
VirtualFree
WaitForSingleObject
CreateEventW
SetEvent
ResetEvent
DeleteFileW
Sleep
WriteFile
CreateFileA
ReadFile
SetFilePointer
GlobalAlloc
GlobalLock
MulDiv
LoadLibraryW
GetSystemDirectoryW
GetVersion
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
GetTickCount
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetConsoleMode
GetConsoleCP
GetLocaleInfoA
SetEnvironmentVariableW
SetEnvironmentVariableA
CompareStringW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetCommandLineW
GetStartupInfoA
GetFileType
SetHandleCount
RtlUnwind
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
InitializeCriticalSectionAndSpinCount
GetModuleFileNameA
GetStdHandle
HeapCreate
GetEnvironmentStringsW
FreeEnvironmentStringsW
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleHandleA
TerminateProcess
GetStartupInfoW
CreateThread
ExitThread
ExitProcess
IsProcessorFeaturePresent
LoadLibraryA
CloseHandle
CreateProcessW
SetCurrentDirectoryW
GetUserDefaultLangID
GetCurrentThreadId
SetLastError
FlushInstructionCache
GetCurrentProcess
DeleteCriticalSection
InitializeCriticalSection
LoadLibraryExW
MultiByteToWideChar
EnterCriticalSection
RaiseException
LeaveCriticalSection
GetModuleHandleW
lstrcmpiW
GetProcAddress
FreeLibrary
GetLastError
InterlockedDecrement
InterlockedIncrement
GlobalFree
lstrcpynW
CreateDirectoryW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetModuleFileNameW
lstrlenW
InterlockedCompareExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
user32
SendMessageW
TranslateMessage
PeekMessageW
UnregisterClassA
DispatchMessageW
RegisterWindowMessageW
InvalidateRect
EndPaint
BeginPaint
ShowWindow
GetForegroundWindow
DrawTextW
GetSysColor
CreateWindowExW
SetFocus
GetFocus
DestroyWindow
IsDialogMessageW
GetMessageW
GetCapture
CreateDialogIndirectParamW
OffsetRect
CopyRect
GetSystemMetrics
SystemParametersInfoW
MonitorFromRect
DrawIcon
ReleaseDC
GetDC
EndDialog
KillTimer
MoveWindow
ScreenToClient
EnableWindow
SetTimer
GetDlgItem
SetDlgItemTextW
SetWindowTextW
PostMessageW
GetWindow
MonitorFromWindow
GetMonitorInfoW
GetWindowRect
GetParent
GetClientRect
MapWindowPoints
LoadIconW
SetWindowPos
GetWindowLongW
GetWindowTextW
GetWindowTextLengthW
SetWindowLongW
DialogBoxParamW
GetActiveWindow
CharNextW
gdi32
GetObjectW
GetStockObject
SetBkMode
SetTextColor
GetDeviceCaps
ExtTextOutW
SetBkColor
GetTextExtentPoint32W
GetTextMetricsW
DeleteDC
SelectObject
CreateCompatibleDC
BitBlt
CreateDIBSection
DeleteObject
CreateFontIndirectW
advapi32
AccessCheck
OpenThreadToken
RevertToSelf
ImpersonateSelf
GetFileSecurityW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegCloseKey
RegOpenKeyExW
AreAllAccessesGranted
shell32
ShellExecuteW
SHBrowseForFolderW
SHGetPathFromIDListW
ole32
CoTaskMemRealloc
CoTaskMemAlloc
CoUninitialize
CoInitialize
CoCreateInstance
CoTaskMemFree
oleaut32
VarUI4FromStr
Sections
.text Size: 145KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ