peverify.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6b51f513debfe7544f481d78ac89fbf0_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
6b51f513debfe7544f481d78ac89fbf0_NeikiAnalytics
-
Size
626KB
-
MD5
6b51f513debfe7544f481d78ac89fbf0
-
SHA1
5f0fdee8a0ad3b1cda8e2df310fd7299bd4b09e5
-
SHA256
48342b0ef8c925847ecf62f19fbc3f729179394867826efa2d28e240d7378562
-
SHA512
6459ee47fab3dd8bca46975f2f9c0c08fd46a21abc402129e7c48239123bf6831f0bc19ed72f94f850db9064f62ff22fa836084e7f58368a4a90610fb255e7cc
-
SSDEEP
12288:aImdHq4Sbwoqg0fitGbna8dQcLk/+cb1q86pJDlAF44bE2cSX:andq5bl0fitGbna8FLk2m1X2D4brr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6b51f513debfe7544f481d78ac89fbf0_NeikiAnalytics
Files
-
6b51f513debfe7544f481d78ac89fbf0_NeikiAnalytics.exe windows:5 windows x86 arch:x86
47743f7625859247ee102d7d5c475510
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
GetRequestedRuntimeInfo
msvcr80
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
_except_handler4_common
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
__winitenv
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
wcscat_s
_purecall
wcschr
_vsnprintf_s
_errno
strcpy_s
wcsncpy_s
wcscpy_s
memmove
_wcsicmp
_wcsnicmp
feof
fgets
atoi
sscanf_s
fclose
swscanf_s
exit
printf
_snwprintf_s
_vsnwprintf_s
wcsstr
fflush
__iob_func
_CxxThrowException
memcpy
__CxxFrameHandler3
memset
fopen_s
_wfopen_s
strchr
advapi32
RegOpenKeyExW
RegOpenKeyExA
RegCloseKey
kernel32
GetVersionExW
CreateFileMappingA
CreateFileMappingW
FreeLibrary
GetCurrentProcessId
LocalAlloc
FormatMessageA
FormatMessageW
InterlockedExchange
Sleep
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WideCharToMultiByte
GetVersion
WriteFile
GetStdHandle
RaiseException
GetConsoleOutputCP
InterlockedIncrement
InterlockedDecrement
GetLastError
lstrlenW
CloseHandle
UnmapViewOfFile
MapViewOfFile
GetFileSize
GetTickCount
GetModuleHandleA
TlsGetValue
InterlockedCompareExchange
SetLastError
GetProcAddress
LocalFree
MultiByteToWideChar
GetCPInfo
GetCurrentThreadId
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetVersionExA
TerminateProcess
GetCurrentProcess
LoadLibraryExA
LoadLibraryExW
GetFullPathNameA
GetFullPathNameW
GetModuleFileNameA
GetModuleFileNameW
CreateFileA
CreateFileW
ole32
CoUninitialize
CoCreateInstance
CoInitialize
user32
LoadStringW
LoadStringA
Sections
.text Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 576KB - Virtual size: 580KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE