b:\source\source.IC\57256\Release_WDEXE_48\WX\Win32\Release\WDExe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2f2747d7ddbdf8ba3ab8d7a2a4c11e80_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2f2747d7ddbdf8ba3ab8d7a2a4c11e80_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
2f2747d7ddbdf8ba3ab8d7a2a4c11e80_NeikiAnalytics
-
Size
318KB
-
MD5
2f2747d7ddbdf8ba3ab8d7a2a4c11e80
-
SHA1
af4f5b1bb942aa5c9f0ff8f3a397819d300a160f
-
SHA256
80f366957f42bb1d58d977435be0e0333e89abc06241008c4d4b8c03a1b94106
-
SHA512
33cd91e62cab8390814961baab296e8d6c533e3203e31b3b053d6ee17496b1c2a2599c31dc46875cf11bedbbb24c7f11e9c8466b649d937011d2fb1a5a64e725
-
SSDEEP
6144:P6fPPiAdrab8aRuwifJ8CieFveMNFnPz8W3bBy23ncnwmRVTRO2Y:P6fPa+rabxWGeBHLb8WLBnXcwmLTy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2f2747d7ddbdf8ba3ab8d7a2a4c11e80_NeikiAnalytics
Files
-
2f2747d7ddbdf8ba3ab8d7a2a4c11e80_NeikiAnalytics.exe windows:4 windows x86 arch:x86
39e2182713656be0dc08924cb10b3298
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
exit
_XcptFilter
_exit
_except_handler3
_onexit
__dllonexit
_lfind
vsprintf
memcmp
iswspace
_vsnprintf
strchr
realloc
towupper
wcspbrk
_wmakepath
_wstati64
_wcsupr
strcat
memmove
wcschr
atoi
strlen
wcsstr
vswprintf
wcscmp
_vsnwprintf
_wcsnicmp
swprintf
_wtoi
_purecall
strncmp
memcpy
_wcsicmp
gmtime
time
free
malloc
memset
wcsrchr
wcsncpy
wcscpy
wcslen
wcscat
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
kernel32
ReleaseMutex
RaiseException
InterlockedExchange
GetSystemDefaultLangID
CreateThread
TerminateThread
ResumeThread
CreateProcessW
ReleaseSemaphore
CreateSemaphoreW
LoadLibraryA
WideCharToMultiByte
InterlockedDecrement
GetCurrentThreadId
TlsFree
TlsAlloc
VirtualProtect
VirtualQuery
TlsGetValue
TlsSetValue
GetDriveTypeW
GetFullPathNameW
FindNextFileW
SetFileAttributesW
GetFileAttributesW
FindClose
FindFirstFileW
CreateDirectoryW
CopyFileW
MoveFileW
DeleteFileW
CreateFileW
FileTimeToSystemTime
FileTimeToLocalFileTime
SetLastError
SetErrorMode
SetEndOfFile
FlushFileBuffers
UnlockFileEx
UnlockFile
LockFileEx
LockFile
SetFilePointer
WriteFile
GetVolumeInformationW
GetLogicalDriveStringsW
GetFileInformationByHandle
LoadLibraryW
GetVersionExW
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedExchangeAdd
InterlockedIncrement
WritePrivateProfileStringW
CreateMailslotW
ExpandEnvironmentStringsW
GetLocalTime
GetComputerNameW
GetProfileStringW
ReadFile
GetExitCodeProcess
GetMailslotInfo
Sleep
GetPrivateProfileStringW
GetPrivateProfileIntW
GetModuleFileNameW
GetLastError
CreateFileMappingW
CloseHandle
MapViewOfFile
UnmapViewOfFile
GetVersionExA
GetModuleHandleW
GetProcAddress
MultiByteToWideChar
CreateEventW
GetStartupInfoW
MulDiv
SetEvent
CreateMutexW
WaitForSingleObject
OpenFileMappingW
FreeLibrary
FindResourceW
LoadResource
LockResource
FreeResource
GetTempPathW
GetTempFileNameW
GetCurrentProcessId
FormatMessageW
LocalFree
GetCommandLineW
ExitProcess
Exports
Exports
CommandeComposante
DeclareProxy
Execution
LibereMutex
Sections
.text Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ