F:\主版本ECGView\ECGViewerOCX\Release\Communications\EdanSerial\EdanSerial.pdb
Static task
static1
Behavioral task
behavioral1
Sample
88f6c6a8e1ed6f122a6732e47efbabb0_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
88f6c6a8e1ed6f122a6732e47efbabb0_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
General
-
Target
88f6c6a8e1ed6f122a6732e47efbabb0_NeikiAnalytics
-
Size
83KB
-
MD5
88f6c6a8e1ed6f122a6732e47efbabb0
-
SHA1
dfe7f95868c2ce12d89f6f62478163b3a33c6164
-
SHA256
c02908fb7d680cb0fe53a4f38206cb0d5ddf093e70b9a704f7ea034601d205b5
-
SHA512
4abedea062706e58add2544e02985fd2e08fe27011b62d3d468231a2b8854afe138010267e5f1fc32d57a2a5d3f02737b5a0fcfe7d3cccce7c71d5665e01b609
-
SSDEEP
1536:cJY3Nh6BINliDE29n+ngLAD2JfFl9ht058cb1zi0OBCZzjsLS:cJWNh6BMI9+gLAyJNb05BbY0OBCZzj/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 88f6c6a8e1ed6f122a6732e47efbabb0_NeikiAnalytics
Files
-
88f6c6a8e1ed6f122a6732e47efbabb0_NeikiAnalytics.dll windows:5 windows x86 arch:x86
d0c39d7ced2bb2eb1f8698f88127372b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
mfc100u
ord7524
ord266
ord11801
ord1480
ord286
ord265
ord908
ord2091
ord2055
ord2053
ord2080
ord1984
ord2045
ord3413
ord408
ord1953
ord2090
ord2088
ord1945
ord1873
ord1934
ord323
ord1301
ord978
ord423
ord981
ord4197
ord10960
ord13398
ord11960
ord2528
ord4290
ord11838
ord290
ord293
ord2614
ord5264
ord285
ord2629
ord421
ord296
ord1310
ord902
ord979
ord322
ord1298
ord13605
ord415
ord1861
ord1897
ord1300
msvcr100
_unlock
__dllonexit
_lock
_onexit
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
__clean_type_info_names_internal
_except_handler4_common
__CppXcptFilter
_amsg_exit
_initterm_e
_initterm
_encoded_null
free
_malloc_crt
isalpha
tolower
isalnum
isspace
strncmp
fclose
memcpy
fseek
ftell
ferror
fprintf
fread
fopen_s
atoi
_vsnprintf_s
fputc
memmove
_purecall
sprintf
_time64
memset
_localtime64_s
__CxxFrameHandler3
memcpy_s
wmemcpy_s
_CxxThrowException
strncpy
strchr
kernel32
ClearCommError
FindClose
FindFirstFileW
WideCharToMultiByte
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
RaiseException
EncodePointer
LocalAlloc
LocalFree
CloseHandle
PurgeComm
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
InterlockedCompareExchange
InterlockedExchange
WaitCommEvent
WaitForMultipleObjects
SetCommMask
GetCommMask
CreateEventW
BuildCommDCBW
EnterCriticalSection
GetLastError
GetOverlappedResult
CreateFileW
ReadFile
LeaveCriticalSection
FormatMessageW
InitializeCriticalSection
SetCommTimeouts
SetCommState
WriteFile
SetEvent
GetCurrentProcess
GetCommState
SetPriorityClass
SetupComm
GetModuleFileNameW
DecodePointer
CreateDirectoryW
WaitForSingleObject
ResetEvent
Sleep
MultiByteToWideChar
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
user32
SendMessageW
Exports
Exports
Close
GetErrorCode
Open
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 696B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ