userinit.pdb
Static task
static1
Behavioral task
behavioral1
Sample
74b0cd2a1d26643249fcaf2a59662b80_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
74b0cd2a1d26643249fcaf2a59662b80_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
74b0cd2a1d26643249fcaf2a59662b80_NeikiAnalytics
-
Size
64KB
-
MD5
74b0cd2a1d26643249fcaf2a59662b80
-
SHA1
5689bc17e4c9eb0044209cf58ccef566c0a31534
-
SHA256
06ef4c82d157c19c0063ac2f4cd62e5d41ded54872167b0952e66088ac945549
-
SHA512
14edc5eef57ce1089b9cf4ffe2cb411962104100596a3078de47ce81e06a179cc6b01c685d2193bf836e3f9ce1b55c63ac4646515ce781f87bcbfe9eb3e0244e
-
SSDEEP
1536:TMJbDMDSA7FxffJaLaSLGYdGXlWtresIiolO/I9Oer:4JbDMOmFCLGYdgWwiolO/bW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 74b0cd2a1d26643249fcaf2a59662b80_NeikiAnalytics
Files
-
74b0cd2a1d26643249fcaf2a59662b80_NeikiAnalytics.exe windows:5 windows x86 arch:x86
f752af36170e273f3502f811b9235c7f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
CreateWindowExW
DestroyWindow
RegisterClassExW
DefWindowProcW
LoadRemoteFonts
wsprintfW
GetSystemMetrics
GetKeyboardLayout
SystemParametersInfoW
GetDesktopWindow
LoadStringW
MessageBoxW
ExitWindowsEx
CharNextW
advapi32
RegOpenKeyExA
ReportEventW
RegisterEventSourceW
DeregisterEventSource
OpenProcessToken
RegCreateKeyExW
RegSetValueExW
GetUserNameW
RegQueryValueExW
RegOpenKeyExW
RegQueryInfoKeyW
RegCloseKey
RegQueryValueExA
crypt32
CryptProtectData
winspool.drv
SpoolerInit
ntdll
RtlLengthSid
RtlCopySid
_itow
RtlFreeUnicodeString
DbgPrint
wcslen
wcscpy
wcscat
wcscmp
RtlInitUnicodeString
NtOpenKey
NtClose
_wcsicmp
memmove
RtlConvertSidToUnicodeString
NtQueryInformationToken
netapi32
DsGetDcNameW
NetApiBufferFree
wldap32
ord46
ord88
ord14
ord12
ord145
ord73
msvcrt
__setusermatherr
_initterm
__getmainargs
_acmdln
_adjust_fdiv
_XcptFilter
_exit
_c_exit
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_cexit
exit
kernel32
CompareFileTime
LoadLibraryW
GetProcAddress
FreeLibrary
lstrcpyW
CreateProcessW
lstrlenW
GetVersionExW
LocalFree
LocalAlloc
GetEnvironmentVariableW
CloseHandle
lstrcatW
WaitForSingleObject
DelayLoadFailureHook
GetStartupInfoA
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
LoadLibraryA
InterlockedCompareExchange
LocalReAlloc
GetSystemTime
lstrcmpW
GetCurrentThread
SetThreadPriority
ExpandEnvironmentStringsW
SearchPathW
GetLastError
CreateThread
GetFileAttributesExW
GetSystemDirectoryW
SetCurrentDirectoryW
FormatMessageW
lstrcmpiW
GetCurrentProcess
GetUserDefaultLangID
GetCurrentProcessId
SetEvent
OpenEventW
Sleep
SetEnvironmentVariableW
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 332B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
oqdfweq Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adate Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE