iexplore.pdb
Static task
static1
General
-
Target
78b9826f7f5499cb166bfed3ce1aa090_NeikiAnalytics
-
Size
1.3MB
-
MD5
78b9826f7f5499cb166bfed3ce1aa090
-
SHA1
15c159511e33360d50256ed921632d45b795d105
-
SHA256
7eaaa2bb1bdaef9cbf99aa46976e54ff3b3a80fad9552688c0f9496d4c73cee0
-
SHA512
23492395505f4c401e7a82a59ae0b74898a9b32b2f01d5fca580676a2253b76e2d35fb789ce5bbdc0614ad78598aa68d0ec1f74130a3c9f331807dab02082682
-
SSDEEP
24576:7Wf4lGLbMMHMMMvMMZMMMKzb6XmMMMiMMMz8JMMHMMM6MMZMMMeXNMMzMMMUMMVh:7gMMHMMMvMMZMMMlmMMMiMMMYJMMHMMe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 78b9826f7f5499cb166bfed3ce1aa090_NeikiAnalytics
Files
-
78b9826f7f5499cb166bfed3ce1aa090_NeikiAnalytics.exe windows:10 windows x64 arch:x64
8d62b7253079493d3b3cc9d2d3d32a62
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
user32
GetWindowThreadProcessId
AllowSetForegroundWindow
FindWindowExW
SendMessageTimeoutW
IsWindowVisible
SetUserObjectInformationW
IsWindowEnabled
msvcrt
_onexit
__dllonexit
_unlock
_lock
memset
_commode
__C_specific_handler
_vsnwprintf
memcpy_s
iswspace
?terminate@@YAXXZ
_purecall
memmove_s
_fmode
_wcmdln
_initterm
__setusermatherr
_cexit
_exit
exit
__set_app_type
wcsncmp
free
_XcptFilter
_amsg_exit
__wgetmainargs
memcmp
kernel32
CreateThreadpoolTimer
ReleaseSRWLockShared
SetThreadpoolTimer
CloseHandle
HeapSetInformation
WaitForSingleObjectEx
DelayLoadFailureHook
ResolveDelayLoadedAPI
GetProcAddress
HeapAlloc
OpenSemaphoreW
SetDllDirectoryW
AcquireSRWLockExclusive
GetTickCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetStartupInfoW
Sleep
IsDebuggerPresent
InitOnceComplete
DebugBreak
GetModuleHandleW
GetProcessHeap
GetCurrentProcessId
DeleteCriticalSection
AcquireSRWLockShared
LocalFree
GetModuleFileNameA
InitOnceBeginInitialize
CreateSemaphoreExW
HeapFree
SetLastError
EnterCriticalSection
GetCommandLineW
GetCurrentProcess
ReleaseSemaphore
GetModuleHandleExW
TerminateProcess
LeaveCriticalSection
InitializeCriticalSection
SetErrorMode
InitializeCriticalSectionEx
WaitForThreadpoolTimerCallbacks
WaitForSingleObject
LocalAlloc
GetCurrentThreadId
ReleaseMutex
FormatMessageW
GetLastError
ReleaseSRWLockExclusive
OutputDebugStringW
CloseThreadpoolTimer
CreateMutexExW
api-ms-win-downlevel-advapi32-l1-1-0
RegGetValueW
EventRegister
EventWriteTransfer
EventWriteEx
EventUnregister
api-ms-win-downlevel-shell32-l1-1-0
SetCurrentProcessExplicitAppUserModelID
advapi32
EventSetInformation
iertutil
ord650
ord791
ord797
ord798
ord701
ord597
ord796
ord793
ord594
ord398
api-ms-win-downlevel-shlwapi-l1-1-0
StrStrIW
api-ms-win-downlevel-ole32-l1-1-0
CoCreateGuid
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 757KB - Virtual size: 757KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE