t:\outlook\x86\ship\0\scanpst.pdb
Static task
static1
Behavioral task
behavioral1
Sample
570d320edc65e7bc32b471f82080d620_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
570d320edc65e7bc32b471f82080d620_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
570d320edc65e7bc32b471f82080d620_NeikiAnalytics
-
Size
1.5MB
-
MD5
570d320edc65e7bc32b471f82080d620
-
SHA1
a8f38336a557833bc82d9e4cc3902eb49621fe9e
-
SHA256
86fd8ac5c2302af4ffaf40b78ed28185f0b1b8e4bbb1a66fc03531169d7c7854
-
SHA512
ab5221f766a3f8f3d17c26608111ce9afeaef9f2f0752c699faf62c64ffcf412a7d73d3301a802f7a0f034369c07a324bbfbca79bf99a76da955f6d4ccb58738
-
SSDEEP
12288:WsjTduSZpUdxB30GHrVxGnXQSaWt+DNISOgv3isiyWc9:WsjTduSZpUR0GHrVQ1aW4mSOgv3isi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 570d320edc65e7bc32b471f82080d620_NeikiAnalytics
Files
-
570d320edc65e7bc32b471f82080d620_NeikiAnalytics.exe windows:4 windows x86 arch:x86
0d9bdab8b3d52d309ed2895d7d10f0ee
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetTickCount
ReadFile
SetFilePointer
CreateFileW
GetVersionExA
FindClose
FindFirstFileW
GetFullPathNameW
GetCurrentThreadId
GetCommandLineW
GetSystemDirectoryW
LoadLibraryExW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
GetProcessHeap
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
VirtualProtect
GetCurrentProcess
CloseHandle
LoadLibraryA
SetErrorMode
lstrlenA
GetSystemDefaultLCID
lstrlenW
OutputDebugStringA
GetModuleFileNameW
SetLastError
GetLastError
GetVersion
GetFileAttributesW
GetProcAddress
GetModuleHandleW
LoadLibraryW
GetModuleHandleA
user32
UnhookWindowsHookEx
SetWindowsHookExA
RegisterWindowMessageA
LoadBitmapA
DestroyWindow
GetWindowPlacement
PostQuitMessage
DefWindowProcW
IsIconic
GetClassInfoW
SendMessageW
EnableMenuItem
GetWindowLongW
SetWindowLongW
SetClassLongA
GetDlgItemTextW
MessageBoxW
EnableWindow
SetForegroundWindow
BeginPaint
EndPaint
GetMessageA
CallNextHookEx
GetDC
ReleaseDC
GetClientRect
LoadStringW
ShowWindow
DialogBoxParamW
CreateWindowExW
RegisterClassW
GetParent
PostMessageA
CallWindowProcW
PeekMessageA
TranslateMessage
DispatchMessageA
FillRect
GetWindowTextA
SendMessageA
GetSysColor
MapWindowPoints
InvalidateRect
UpdateWindow
SetDlgItemTextW
GetWindowLongA
WinHelpA
IsDlgButtonChecked
EndDialog
SetWindowLongA
SendDlgItemMessageA
GetDlgItem
SetFocus
GetWindowRect
GetSystemMetrics
SetWindowPos
FindWindowW
LoadIconA
LoadCursorA
SetCursor
gdi32
GetPixel
DeleteDC
DeleteObject
SelectObject
BitBlt
SetTextColor
ExtTextOutA
CreateCompatibleBitmap
CreateCompatibleDC
Rectangle
GetStockObject
CreateSolidBrush
GetObjectA
LineTo
CreatePen
MoveToEx
SetBkColor
advapi32
RegQueryValueExW
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExW
olmapi32
ord259
scnpst32
RCVR_CountBlocks32@16
RCVR_Repair32@8
RCVR_Scan32@32
RCVR_Deinitialize32@0
RCVR_SetProgressCallbacks32@8
RCVR_Initialize32@8
scnpst64
RCVR_Initialize64@8
RCVR_SetProgressCallbacks64@8
RCVR_Deinitialize64@0
RCVR_Scan64@32
RCVR_Repair64@8
RCVR_CountBlocks64@16
msvcr80
_controlfp_s
_invoke_watson
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
_crt_debugger_hook
_except_handler4_common
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
memcpy
memset
_vsnwprintf
memmove
towupper
iswspace
_wtoi
_amsg_exit
Sections
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.4MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE