A:\FFFFFFFFFss.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ac42262c1abb2c95cc6b463076acd340_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ac42262c1abb2c95cc6b463076acd340_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
ac42262c1abb2c95cc6b463076acd340_NeikiAnalytics
-
Size
348KB
-
MD5
ac42262c1abb2c95cc6b463076acd340
-
SHA1
b2f3bac932f79bf3d78838b10eb9844ebe7617e0
-
SHA256
0814ebee33ad8e3f4f4be3094ab3cdf7bdd30d0a285bfcae7c609d2a0d20535a
-
SHA512
ba3c978cd9c1aa57462bb1026b2b82d6077e62abe7df34b6b04d8707c92b3bdd3687a2cfb011b7ba6ee1bcfc00ea3155b88a4cd349da7f982f60e2ee8d77e006
-
SSDEEP
6144:nmLvgrTuPTEkdOJRxwmMFL5gO2hdrCQ/D1+OpGD+sfYKT:mD5wuOzxw/FFF2hcaDVpGK+T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac42262c1abb2c95cc6b463076acd340_NeikiAnalytics
Files
-
ac42262c1abb2c95cc6b463076acd340_NeikiAnalytics.exe windows:4 windows x86 arch:x86
2376a3f0ae02846914825d5a57784fe0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InterlockedExchange
GetTickCount
FindFirstChangeNotificationW
SetLocaleInfoA
CancelWaitableTimer
FreeEnvironmentStringsA
GetSystemPowerStatus
GetTimeFormatW
GetModuleFileNameA
GetComputerNameExW
QueueUserWorkItem
lstrlenW
GetSystemDefaultLangID
FindNextVolumeMountPointA
GetFileSize
GetProcessAffinityMask
GetSystemDirectoryA
EnumSystemLanguageGroupsW
GetLongPathNameA
HeapCompact
IsBadCodePtr
GetProfileStringW
OpenWaitableTimerW
WinExec
ResumeThread
CreateTimerQueue
GlobalLock
GlobalSize
QueryDosDeviceA
GetPriorityClass
VirtualFreeEx
GlobalGetAtomNameW
RegisterWaitForSingleObject
GetProcessVersion
SetCommConfig
DeleteTimerQueueTimer
ExpandEnvironmentStringsA
FreeLibrary
SetMessageWaitingIndicator
FlushConsoleInputBuffer
SetPriorityClass
GetCalendarInfoW
SetCalendarInfoA
SetHandleCount
SetProcessWorkingSetSize
MapViewOfFileEx
lstrcatA
user32
GetWindowLongA
GetTitleBarInfo
BroadcastSystemMessageW
CallNextHookEx
IsMenu
GetMenuStringA
SendMessageCallbackA
ScrollDC
CharUpperBuffA
SetMenuItemInfoW
CreateWindowExA
rpcrt4
RpcAsyncGetCallStatus
RpcEpRegisterW
RpcSmEnableAllocate
RpcBindingInqAuthInfoExA
NdrVaryingArrayBufferSize
NDRCContextBinding
NdrXmitOrRepAsFree
RpcStringBindingComposeW
NdrUserMarshalFree
RpcBindingSetAuthInfoExW
UuidToStringA
I_RpcServerUseProtseqEp2A
NdrSendReceive
RpcServerUnregisterIf
NdrEncapsulatedUnionBufferSize
I_RpcClearMutex
RpcSsDisableAllocate
RpcNsBindingInqEntryNameW
NDRSContextUnmarshallEx
NdrConformantVaryingArrayUnmarshall
pdh
PdhFormatFromRawValue
PdhEnumObjectsW
PdhEnumMachinesA
PdhUpdateLogFileCatalog
PdhGetFormattedCounterValue
PdhLookupPerfIndexByNameA
PdhGetDllVersion
PdhValidatePathW
PdhCloseLog
PdhEnumObjectsA
PdhGetDefaultPerfObjectA
PdhUpdateLogA
PdhRemoveCounter
PdhSetQueryTimeRange
PdhMakeCounterPathA
PdhExpandCounterPathW
PdhGetDefaultPerfCounterA
PdhSelectDataSourceA
PdhEnumObjectItemsW
PdhUpdateLogW
PdhParseInstanceNameA
PdhParseInstanceNameW
PdhGetDataSourceTimeRangeA
Sections
.text Size: 260KB - Virtual size: 257KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ