c:\users\mac\documents\visual studio 2005\projects\bbll\x64\debug\BBLL.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3c71ea2a54ddcc72ae171923b3425310_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3c71ea2a54ddcc72ae171923b3425310_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3c71ea2a54ddcc72ae171923b3425310_NeikiAnalytics
-
Size
175KB
-
MD5
3c71ea2a54ddcc72ae171923b3425310
-
SHA1
01cf67737a6cd3d991a79d45431b847192ca630d
-
SHA256
16b320e8663c8c9a199fcee1d5e374bffafb5f3e06fcc9a791181190b8228369
-
SHA512
163bf0a58d6e5fd1cbbca1c49e96f75b53fab6e086d5d879bb567a5c529905b0032a432f773d6eda5915ecc6b39291bbea2d684b52ee36ba837245a5b10527a7
-
SSDEEP
3072:ktJT6xJ0lb+Za64/lfFF70zsN+ozMneP7XobU6arK/TWXL:gJTaJ6+ZI5Fi4wneromrK/K
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c71ea2a54ddcc72ae171923b3425310_NeikiAnalytics
Files
-
3c71ea2a54ddcc72ae171923b3425310_NeikiAnalytics.exe windows:4 windows x64 arch:x64
1640675897e8c92310853a990bac4de1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetProcAddress
LocalAlloc
LoadLibraryA
CompareStringW
CompareStringA
GetTimeZoneInformation
HeapReAlloc
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetTimeFormatA
GetDateFormatA
GetLocaleInfoW
GetLocaleInfoA
HeapSize
Sleep
GetOEMCP
GetACP
GetModuleHandleA
ExitProcess
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RaiseException
DebugBreak
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
FlsGetValue
TlsAlloc
FlsSetValue
TlsFree
FlsFree
SetLastError
GetCurrentThreadId
GetLastError
TlsSetValue
GetCurrentThread
FlsAlloc
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
RtlUnwindEx
SetConsoleCtrlHandler
FreeLibrary
InitializeCriticalSection
GetModuleFileNameW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapSetInformation
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualQuery
GetCPInfo
SetEnvironmentVariableA
user32
EndDialog
DialogBoxParamW
DestroyWindow
DefWindowProcW
BeginPaint
EndPaint
PostQuitMessage
CreateWindowExW
ShowWindow
UpdateWindow
LoadIconW
LoadCursorW
RegisterClassExW
LoadStringW
LoadAcceleratorsW
GetMessageW
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
Sections
.text Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ