C:\Users\Vinay\Projects\simple_launcher\dist\w64.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0ab7dbaa8e785a63ab1c0a295534ddd0_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
0ab7dbaa8e785a63ab1c0a295534ddd0_NeikiAnalytics
-
Size
1.3MB
-
MD5
0ab7dbaa8e785a63ab1c0a295534ddd0
-
SHA1
a5adc6e98c939446a26d329794e9dd64ac176984
-
SHA256
9e12579b38a11ecbfaccf765370ded29f26bb3ee6709f598e96edbe5aadf4a11
-
SHA512
9ac414628556787f366d7f2435e44eb086b43dc1bfb7909bc05da1cdf9b7fdf3dbfab7414dc5bfb0b85d63f6eba071761b4841012dde5208cb4392402375482a
-
SSDEEP
12288:AuwxKXfxTHP5vDDtbxTezGwd7EM5dEfp5MkVK93P+SdkSS+C3/eoPdBvn:A5xKvxTpDD6qrf3MkIkSFuv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ab7dbaa8e785a63ab1c0a295534ddd0_NeikiAnalytics
Files
-
0ab7dbaa8e785a63ab1c0a295534ddd0_NeikiAnalytics.exe windows:5 windows x64 arch:x64
aa50eae7a6b05c85c7e150c78f8e192f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
ExitProcess
GetCommandLineW
SearchPathW
SetInformationJobObject
FreeLibrary
CreateProcessW
GetCurrentProcess
WaitForSingleObject
GenerateConsoleCtrlEvent
AssignProcessToJobObject
FormatMessageW
GetExitCodeProcess
GetModuleFileNameW
QueryInformationJobObject
MultiByteToWideChar
CreateJobObjectA
GetStdHandle
GetLastError
GetProcAddress
LoadLibraryA
SetConsoleCtrlHandler
DuplicateHandle
CloseHandle
GetProcessHeap
SetEndOfFile
HeapReAlloc
SetEnvironmentVariableW
GetModuleHandleW
DecodePointer
HeapFree
HeapAlloc
GetStringTypeW
GetCommandLineA
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlUnwindEx
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
EncodePointer
DeleteCriticalSection
LoadLibraryW
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
FlsAlloc
WriteFile
HeapSetInformation
GetVersion
HeapCreate
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
ReadFile
SetHandleCount
GetFileType
SetFilePointer
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleFileNameA
WideCharToMultiByte
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
CreateFileW
HeapSize
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
CompareStringW
WriteConsoleW
shlwapi
StrStrIW
PathRemoveFileSpecW
PathCombineW
Sections
.text Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE