D:\trunk\2345pic\tools\RCHomePage\bin\Win32\Release\pdb\2345PicHomePage.pdb
Static task
static1
Behavioral task
behavioral1
Sample
180e9fc668832da4c2b22a10199899c0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
180e9fc668832da4c2b22a10199899c0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
180e9fc668832da4c2b22a10199899c0_NeikiAnalytics
-
Size
250KB
-
MD5
180e9fc668832da4c2b22a10199899c0
-
SHA1
31602fa6935a531c935ac563631b74de8668a8b9
-
SHA256
6ac9bbd9c659a4d3a3e9199862abe8be956df7cea9456ef2df4368c4cb0b706b
-
SHA512
6811caac2ef80d569c7f2b0f1871252f2389313c97c398022d2d85f2c4b123eab8fe5841d4bab733c4ea87bcf57518ea3041ca78a907f9c52a2677e67321a8e1
-
SSDEEP
6144:lkD7LV+t5Q9yRmxcU9zBmTui3jw33MfB6D1mH4:lkDsuyRmxcazBmai3E3cfB6RmH4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 180e9fc668832da4c2b22a10199899c0_NeikiAnalytics
Files
-
180e9fc668832da4c2b22a10199899c0_NeikiAnalytics.exe windows:5 windows x86 arch:x86
66af6de2f904aca40308a487184d0386
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProcAddress
LocalFree
ExpandEnvironmentStringsW
CreateProcessW
WaitForSingleObject
GetModuleHandleW
GetLastError
CloseHandle
GetCurrentProcessId
LoadLibraryExW
LoadLibraryW
GetModuleFileNameW
GetFileAttributesW
CreateMutexW
Sleep
ReleaseMutex
FindFirstFileW
CreateFileW
GetLongPathNameW
GetFileAttributesExW
GetVersionExW
lstrlenW
lstrcmpiW
lstrcatW
lstrcpyW
GetCurrentProcess
OpenProcess
QueryDosDeviceW
HeapAlloc
HeapFree
GetProcessHeap
GetCurrentThreadId
FindResourceW
LoadResource
LockResource
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetFileSizeEx
SetFilePointer
SetEndOfFile
WriteFile
ReadFile
DeleteFileW
InitializeCriticalSectionAndSpinCount
GetFullPathNameW
CreateDirectoryW
SetFileAttributesW
FindClose
GetFileSize
WideCharToMultiByte
GetACP
MultiByteToWideChar
GetLogicalDriveStringsW
FormatMessageW
EncodePointer
DecodePointer
GetCommandLineW
IsDebuggerPresent
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
RaiseException
RtlUnwind
ExitProcess
GetModuleHandleExW
HeapSize
SetLastError
GetStdHandle
GetFileType
GetStartupInfoW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
IsValidCodePage
GetOEMCP
GetCPInfo
GetStringTypeW
HeapReAlloc
LCMapStringW
OutputDebugStringW
GetConsoleCP
GetConsoleMode
SetFilePointerEx
SetStdHandle
WriteConsoleW
FlushFileBuffers
shell32
CommandLineToArgvW
Sections
.text Size: 154KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.zero Size: 4KB - Virtual size: 3KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ