E:\a\svn\源码\C++源码\核心源码\激活工具\n\SOS\Release\SOS.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a71baeeb96834f0f0836bd6aa9a8c4d0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
a71baeeb96834f0f0836bd6aa9a8c4d0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
a71baeeb96834f0f0836bd6aa9a8c4d0_NeikiAnalytics
-
Size
6.1MB
-
MD5
a71baeeb96834f0f0836bd6aa9a8c4d0
-
SHA1
5704732e80f80067a268157e55110a5380e73576
-
SHA256
e1048ef77608644a3c6e052200f564a89ce9d390855ed9521aa2caccc8f1729b
-
SHA512
083aa1dfacb705fab2b158300cbe8466dc8e241825814f5e7ccfda2c4238bce56980dc9e300c71e1e0104a291d22b8cc1f562d34e98eaefe294465cd861db47e
-
SSDEEP
196608:q70n0ET4jjwyCtO4vH07LmgsmyB87J/v1DpH:6S0EcYyXYHUP7Fv1DpH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a71baeeb96834f0f0836bd6aa9a8c4d0_NeikiAnalytics
Files
-
a71baeeb96834f0f0836bd6aa9a8c4d0_NeikiAnalytics.exe windows:5 windows x86 arch:x86
a4393bf9a31145b91bc37467ae806a80
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
RtlUnwind
RaiseException
HeapReAlloc
HeapSize
Sleep
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
VirtualAlloc
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetLocaleInfoA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
CreateFileA
InterlockedCompareExchange
GetCurrentProcess
SetEndOfFile
FlushFileBuffers
SetFilePointer
ReadFile
GetLocaleInfoW
InterlockedExchange
GlobalFlags
lstrlenA
lstrcmpA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
GetModuleHandleA
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
LoadLibraryW
LoadLibraryA
lstrcmpW
GetVersionExA
FreeLibrary
InterlockedDecrement
GetModuleHandleW
GetProcAddress
GetCurrentProcessId
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
LocalFree
lstrlenW
GetExitCodeProcess
TerminateProcess
CreateDirectoryW
GetOverlappedResult
WaitForSingleObject
GetLastError
WriteFile
GetProcessHeap
CreateFileW
CloseHandle
Process32NextW
FindResourceW
LoadResource
LockResource
SizeofResource
Process32FirstW
GetTickCount
CreateToolhelp32Snapshot
user32
DrawTextExW
DrawTextW
TabbedTextOutW
RegisterWindowMessageW
WinHelpW
GetCapture
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetFocus
GetWindowTextW
GetForegroundWindow
DispatchMessageW
GetTopWindow
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetMenu
SetForegroundWindow
PostMessageW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
PtInRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
GetMenu
SetWindowLongW
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
GetSysColor
DestroyMenu
CopyRect
UnhookWindowsHookEx
DestroyWindow
IsWindow
GetDlgItem
GetWindowThreadProcessId
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
MessageBoxW
GetMenuState
LoadIconW
GetMenuItemID
GetMenuItemCount
GetSubMenu
EnableWindow
GetClientRect
GetSystemMetrics
IsIconic
SendMessageW
PostQuitMessage
ValidateRect
LoadCursorW
GetSysColorBrush
SetWindowTextW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
ReleaseDC
GetDC
ClientToScreen
GrayStringW
SetWindowsHookExW
gdi32
SetMapMode
DeleteObject
PtVisible
RectVisible
TextOutW
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
CreateBitmap
GetStockObject
SaveDC
RestoreDC
SetBkColor
SetTextColor
GetClipBox
ExtTextOutW
GetDeviceCaps
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
shell32
ShellExecuteExW
SHGetSpecialFolderPathW
shlwapi
PathFileExistsW
oleaut32
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 155KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5.8MB - Virtual size: 5.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ