c:\CodeBases\isdev\redist\language independent\i386\SetupSuite.pdb
Static task
static1
Behavioral task
behavioral1
Sample
515d4843af3c71f404d3217bc072f760_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
515d4843af3c71f404d3217bc072f760_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
515d4843af3c71f404d3217bc072f760_NeikiAnalytics
-
Size
1.8MB
-
MD5
515d4843af3c71f404d3217bc072f760
-
SHA1
ed0e285bd730af137b486db772448df5a810b0f5
-
SHA256
4105f872d856d1250c98e837ac13619e2c122a2d588154ed6a5b84ca70fdfb9c
-
SHA512
8cfe1cfa6d54d7314184e831c52904fb1516bfc79abe3e05e7450cb1d52cace75bf2afd99fbab086fe2e464abb3d7babe268f7506e3e663e5cd5f7ea17ceaf98
-
SSDEEP
49152:3OK0/Wl+8YyqIyTqmmA397SzTvgoRz+FqGyzo:+K0/+YyqImlIZp+B+o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 515d4843af3c71f404d3217bc072f760_NeikiAnalytics
Files
-
515d4843af3c71f404d3217bc072f760_NeikiAnalytics.exe windows:5 windows x86 arch:x86
7239f5b59d9687427f755133eb9273d4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msi
ord205
ord141
ord169
ord88
ord190
ord179
ord118
ord125
ord115
ord171
ord111
ord70
ord175
wintrust
WinVerifyTrust
kernel32
GetFileSize
CreateFileMappingW
MapViewOfFile
WideCharToMultiByte
UnmapViewOfFile
CloseHandle
DeleteFileW
Sleep
RemoveDirectoryW
GetModuleFileNameW
GetSystemDirectoryW
SetCurrentDirectoryW
CreateProcessW
WaitForSingleObject
ExitProcess
DuplicateHandle
GetCurrentProcess
TerminateProcess
MoveFileExW
GetThreadContext
VirtualProtectEx
WriteProcessMemory
FlushInstructionCache
SetThreadContext
ResumeThread
GetProcAddress
ReadFile
InterlockedDecrement
InterlockedIncrement
LocalFree
GetVersionExW
GetTempPathW
GetWindowsDirectoryW
QueryPerformanceFrequency
CreateEventW
SetFilePointer
lstrlenW
ReleaseMutex
CreateMutexW
CreateFileW
CreateNamedPipeW
SetEvent
EnterCriticalSection
LeaveCriticalSection
GetDriveTypeW
GetUserDefaultLangID
OpenEventW
CopyFileW
GetCurrentThreadId
GetModuleHandleW
DeleteCriticalSection
RaiseException
InitializeCriticalSection
CompareStringA
VirtualQuery
GetSystemInfo
IsBadReadPtr
WriteFile
FlushFileBuffers
FindClose
FindFirstFileW
FileTimeToSystemTime
SystemTimeToFileTime
FileTimeToLocalFileTime
GetUserDefaultLCID
GetSystemDefaultLCID
GetSystemDefaultUILanguage
GetACP
GetSystemDefaultLangID
LoadLibraryW
FreeLibrary
GetFileAttributesW
ConnectNamedPipe
GetCurrentProcessId
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetConsoleMode
lstrlenA
FormatMessageW
HeapFree
MultiByteToWideChar
SetLastError
GetLastError
LocalAlloc
GetExitCodeThread
GetConsoleCP
LCMapStringA
GetModuleHandleA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetSystemTimeAsFileTime
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
HeapSize
HeapReAlloc
GetCurrentThread
lstrcmpiW
lstrcpyW
lstrcpynW
SearchPathW
VirtualProtect
lstrcatW
QueryPerformanceCounter
ResetEvent
GetTickCount
CompareFileTime
GetTempFileNameW
LoadLibraryExW
OpenProcess
GetProcessTimes
GetExitCodeProcess
GetVersion
GetTimeFormatW
GetDateFormatW
GetProcessHeap
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualFree
HeapCreate
LCMapStringW
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetCPInfo
RtlUnwind
GetStartupInfoW
HeapAlloc
VirtualAlloc
CreateThread
ExitThread
user32
WaitForInputIdle
CharUpperW
ExitWindowsEx
PostThreadMessageW
GetDesktopWindow
DispatchMessageA
DispatchMessageW
TranslateMessage
GetMessageA
GetMessageW
IsWindowUnicode
PeekMessageW
CharLowerW
GetGUIThreadInfo
MessageBoxW
wsprintfW
MsgWaitForMultipleObjects
advapi32
RegQueryValueExW
RegQueryInfoKeyW
RegEnumKeyExW
OpenThreadToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
RegEnumValueW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegDeleteValueW
RegOpenKeyW
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
shell32
SHGetSpecialFolderLocation
SHGetSpecialFolderPathW
SHGetPathFromIDListW
ShellExecuteExW
SHGetMalloc
ole32
CoUnmarshalInterface
CreateStreamOnHGlobal
CoMarshalInterface
CoCreateGuid
CoReleaseMarshalData
CoCreateInstance
CoInitialize
CLSIDFromProgID
CoGetInterfaceAndReleaseStream
CoRevokeClassObject
CoRegisterClassObject
CoRegisterPSClsid
CoUninitialize
CoInitializeEx
CoMarshalInterThreadInterfaceInStream
oleaut32
SafeArrayCreate
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
SafeArrayGetElement
SafeArrayDestroy
SafeArrayPutElement
VariantTimeToSystemTime
VariantChangeTypeEx
VariantChangeType
LoadTypeLi
LoadRegTypeLi
GetErrorInfo
VarBstrCat
SysStringByteLen
SysAllocStringByteLen
VariantCopy
SysAllocString
VariantInit
BSTR_UserFree
VARIANT_UserFree
BSTR_UserUnmarshal
BSTR_UserMarshal
VARIANT_UserUnmarshal
VARIANT_UserSize
BSTR_UserSize
VARIANT_UserMarshal
SysStringLen
SysReAllocStringLen
SysAllocStringLen
SysFreeString
RegisterTypeLi
VariantClear
rpcrt4
IUnknown_QueryInterface_Proxy
NdrStubForwardingFunction
NdrOleAllocate
UuidCreate
UuidToStringW
RpcStringFreeW
NdrDllGetClassObject
IUnknown_AddRef_Proxy
NdrCStdStubBuffer2_Release
IUnknown_Release_Proxy
NdrStubCall2
NdrOleFree
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
Sections
.text Size: 608KB - Virtual size: 608KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.orpc Size: 512B - Virtual size: 418B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 151KB - Virtual size: 151KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 394KB - Virtual size: 394KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ