ReadOutLoud.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3a6446f924797bd1215c4801e0d4c540_NeikiAnalytics.dll
Resource
win7-20240221-en
General
-
Target
3a6446f924797bd1215c4801e0d4c540_NeikiAnalytics
-
Size
339KB
-
MD5
3a6446f924797bd1215c4801e0d4c540
-
SHA1
68047b405a6fab6edcf2b47919de53837b669afb
-
SHA256
ef08e35cc9e329cfe8a822fbe6350f8485deb8b4370728bd08358dace4ea2643
-
SHA512
b2ffd0028565c257393ef4e5ce9a93e1bc775fc3858f747beb8119bd7955c0d2481ef6543e6409fefa710df26bc5108566f8b1b30762849380e147be223ff5f4
-
SSDEEP
6144:AcElz5LNIfuExIOZK4ty1PfcT1r4ERc1wM1JDgZQ9yT+11kTfcEM/:AhCuExsclR31YX/kTi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a6446f924797bd1215c4801e0d4c540_NeikiAnalytics
Files
-
3a6446f924797bd1215c4801e0d4c540_NeikiAnalytics.dll windows:5 windows x86 arch:x86
76e5f8a2accd43566e6cfeb43d596d34
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
FreeLibrary
GetUserDefaultLangID
GetVersionExA
FreeResource
LockResource
LoadResource
FindResourceA
GetModuleFileNameA
SizeofResource
lstrlenA
OutputDebugStringA
lstrcatA
GetTickCount
DisableThreadLibraryCalls
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
Sleep
InterlockedExchange
DecodePointer
EncodePointer
GetSystemTimeAsFileTime
GetModuleFileNameW
SetLastError
LoadLibraryW
GetLastError
GetVersion
GetFileAttributesW
GetProcAddress
GetModuleHandleW
GetModuleHandleA
MultiByteToWideChar
lstrcpynA
WideCharToMultiByte
user32
TranslateMessage
GetMessageA
DispatchMessageA
OemToCharA
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
ole32
CoTaskMemFree
CoCreateInstance
msvcp100
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
?_Orphan_all@_Container_base0@std@@QAEXXZ
msvcr100
_crt_debugger_hook
__CppXcptFilter
_amsg_exit
_initterm_e
_initterm
_encoded_null
_malloc_crt
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
strncat
wcsncpy
_stricmp
tolower
atoi
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__clean_type_info_names_internal
_except_handler4_common
strlen
memcpy
memmove
memset
__CxxFrameHandler3
_CxxThrowException
??3@YAXPAX@Z
strrchr
strcmp
??0exception@std@@QAE@ABQBD@Z
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??2@YAPAXI@Z
??0exception@std@@QAE@ABV01@@Z
_itoa_s
wcslen
memchr
_purecall
pow
wcscmp
wcscpy
??_V@YAXPAX@Z
wcscat
wcstol
strtol
isdigit
free
memcmp
_getcwd
_chdir
_findfirst64i32
_findclose
_findnext64i32
_mbsstr
shlwapi
StrToIntExA
Exports
Exports
PlugInMain
Sections
.text Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 246KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ