D:\Work\OpenSource\Github\MeshAgent\Release\MeshService64.pdb
Static task
static1
Behavioral task
behavioral1
Sample
47357708a1a1558df766774ab7231030_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
47357708a1a1558df766774ab7231030_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
47357708a1a1558df766774ab7231030_NeikiAnalytics
-
Size
5.7MB
-
MD5
47357708a1a1558df766774ab7231030
-
SHA1
62bdee9661bfb94e7efef41a8aa3483e1c261eb5
-
SHA256
4f8581b5e181dd7029d3be8c58ae04fa97135905e484183dd542e8e903d6a4e6
-
SHA512
30954d145c21155c80941d9c75ce01ce5d126a21dea11c6afea710807f7795226659d9ece6ffc1b121fe63647728e9da97608b15dbad726ae0088b39254775f8
-
SSDEEP
98304:uHyVffDgGhv9sCZ8t4DPwWi0ggjBb920JKZoDKJga:4MMaGM8+DPwWbTtK8a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 47357708a1a1558df766774ab7231030_NeikiAnalytics
Files
-
47357708a1a1558df766774ab7231030_NeikiAnalytics.exe windows:6 windows x64 arch:x64
79373d0fe318fd26a61bc33ea49a2206
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
comctl32
InitCommonControlsEx
dbghelp
SymFunctionTableAccess64
MiniDumpWriteDump
SymGetModuleBase64
SymGetLineFromAddr64
SymFromAddr
SymInitialize
StackWalk64
iphlpapi
ConvertLengthToIpv4Mask
SendARP
GetAdaptersAddresses
GetAdaptersInfo
ws2_32
ntohs
ntohl
WSAGetLastError
ioctlsocket
recv
send
gethostname
WSASocketW
listen
closesocket
bind
accept
__WSAFDIsSet
htonl
htons
getsockname
select
WSASetLastError
setsockopt
socket
sendto
getsockopt
recvfrom
connect
shutdown
WSAIoctl
GetAddrInfoW
WSAResetEvent
WSAEventSelect
WSAStartup
WSACreateEvent
FreeAddrInfoW
WSACleanup
WSACloseEvent
crypt32
CertDuplicateCertificateContext
CertDeleteCertificateFromStore
CryptAcquireCertificatePrivateKey
CertAddEncodedCertificateToStore
CryptMsgClose
CryptMsgUpdate
CryptExportPublicKeyInfo
CertCreateSelfSignCertificate
CertFreeCertificateContext
CryptMsgOpenToEncode
CertAddCertificateContextToStore
PFXExportCertStore
CryptSignAndEncodeCertificate
CertCloseStore
CertStrToNameA
CryptMsgGetParam
CryptEncodeObject
CertSetCertificateContextProperty
CertEnumCertificatesInStore
CryptMsgCalculateEncodedLength
CertOpenStore
CertStrToNameW
CertGetCertificateContextProperty
CertFindCertificateInStore
wtsapi32
WTSFreeMemory
WTSQueryUserToken
WTSEnumerateSessionsA
gdiplus
GdipGetImageEncoders
GdiplusShutdown
GdiplusStartup
GdipCloneImage
GdipAlloc
GdipLoadImageFromStream
GdipDisposeImage
GdipLoadImageFromStreamICM
GdipFree
GdipGetImageEncodersSize
GdipSaveImageToStream
ncrypt
NCryptSetProperty
NCryptOpenStorageProvider
BCryptGenRandom
BCryptCloseAlgorithmProvider
NCryptCreatePersistedKey
NCryptFreeObject
NCryptFinalizeKey
BCryptOpenAlgorithmProvider
shlwapi
PathFileExistsA
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
kernel32
GetStartupInfoW
RtlUnwindEx
EncodePointer
RaiseException
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
GetFullPathNameW
GetStdHandle
WriteFile
OutputDebugStringA
LoadLibraryExA
GetModuleFileNameW
GetSystemPowerStatus
OpenProcess
MultiByteToWideChar
Sleep
GetLastError
CloseHandle
GetCurrentDirectoryW
SetCurrentDirectoryW
GetProcAddress
SetEnvironmentVariableA
CreateProcessW
FreeLibrary
WideCharToMultiByte
GetCurrentThreadId
GetModuleHandleA
WaitForSingleObjectEx
CreateThread
QueueUserAPC
OpenThread
ReadFile
Process32First
TerminateProcess
CreateToolhelp32Snapshot
LoadLibraryA
Process32Next
SleepEx
TlsGetValue
GetCurrentProcess
SetThreadExecutionState
HeapFree
HeapAlloc
GetProcessHeap
SystemTimeToFileTime
GetSystemTime
FileTimeToSystemTime
QueryPerformanceFrequency
SystemTimeToTzSpecificLocalTime
QueryPerformanceCounter
ReleaseSemaphore
WaitForSingleObject
CreateSemaphoreA
CancelIo
FindFirstFileW
FindNextFileW
RemoveDirectoryW
GetFinalPathNameByHandleW
GetDriveTypeA
SetFilePointer
FindFirstVolumeA
FindClose
CreateFileW
GetVolumePathNamesForVolumeNameA
GetFileAttributesExW
ReadDirectoryChangesW
FindNextVolumeA
FindVolumeClose
GetDiskFreeSpaceExA
CreateEventA
GetModuleHandleExA
WaitForMultipleObjectsEx
CreateNamedPipeA
DisconnectNamedPipe
CreateFileA
CancelIoEx
LocalFree
ConnectNamedPipe
IsProcessorFeaturePresent
GetConsoleMode
SetConsoleOutputCP
IsDebuggerPresent
GetTempPathW
CancelSynchronousIo
SetEvent
ResetEvent
GetThreadId
GetCurrentProcessId
GetEnvironmentStrings
FreeEnvironmentStringsA
CopyFileW
RtlCaptureContext
SuspendThread
ResumeThread
DuplicateHandle
GetTickCount64
GetCurrentThread
DeleteFileA
GetOverlappedResult
GetThreadContext
WTSGetActiveConsoleSessionId
GetExitCodeProcess
SetEndOfFile
DeleteFileW
SetFilePointerEx
GetModuleFileNameA
SizeofResource
SetConsoleCtrlHandler
FindResourceA
CreateMutexA
GetTempPathA
GetSystemDirectoryA
LockResource
FreeConsole
GetWindowsDirectoryA
LoadResource
GetLocalTime
GetConsoleWindow
LoadLibraryExW
SetLastError
GetFileType
GetModuleHandleW
SwitchToFiber
DeleteFiber
CreateFiber
GetSystemTimeAsFileTime
ConvertFiberToThread
ConvertThreadToFiber
GetEnvironmentVariableW
ReadConsoleA
ReadConsoleW
TlsSetValue
TlsFree
RtlPcToFileHeader
ExitProcess
GetModuleHandleExW
CreateDirectoryW
GetConsoleOutputCP
MoveFileExW
SetEnvironmentVariableW
GetTimeZoneInformation
SetStdHandle
GetDriveTypeW
GetFileInformationByHandle
PeekNamedPipe
GetCommandLineA
GetCommandLineW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetFileSizeEx
HeapReAlloc
FlushFileBuffers
GetCPInfo
SetUnhandledExceptionFilter
InitializeSListHead
UnhandledExceptionFilter
RtlVirtualUnwind
SetConsoleMode
RtlLookupFunctionEntry
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
WriteConsoleW
SetSystemPowerState
HeapSize
user32
SetWindowPos
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxW
MessageBeep
ExitWindowsEx
GetUserObjectInformationA
EnumDisplayMonitors
GetSystemMetrics
SetThreadDesktop
GetThreadDesktop
CloseDesktop
BlockInput
GetMonitorInfoA
OpenInputDesktop
ShowWindow
GetMessageA
GetMessageExtraInfo
LoadCursorA
DestroyWindow
GetDC
PostMessageA
GetIconInfo
CallNextHookEx
GetCursorInfo
SetWindowsHookExA
MapVirtualKeyA
GetForegroundWindow
UnhookWindowsHookEx
DefWindowProcA
CreateWindowExA
TranslateMessage
UnregisterClassA
DrawIconEx
SetWinEventHook
RegisterClassExA
UnhookWinEvent
SetForegroundWindow
ReleaseDC
SendInput
SetProcessDPIAware
GetDlgItemTextA
EndDialog
DispatchMessageA
DialogBoxParamA
GetKeyState
MessageBoxA
gdi32
BitBlt
StretchBlt
DeleteDC
SetStretchBltMode
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
GetDIBits
DeleteObject
GetObjectA
advapi32
StartServiceCtrlDispatcherA
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
CryptCreateHash
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptAcquireContextW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
CreateProcessAsUserA
RegCreateKeyW
RegSetValueExA
RegDeleteKeyA
RegCloseKey
RegOpenKeyExA
OpenProcessToken
InitiateSystemShutdownA
LookupPrivilegeValueA
AdjustTokenPrivileges
CryptReleaseContext
RegSetValueExW
CryptDestroyKey
InitializeSecurityDescriptor
SetEntriesInAclA
SetSecurityDescriptorDacl
DuplicateTokenEx
CreateProcessAsUserW
SetTokenInformation
CheckTokenMembership
FreeSid
RegisterServiceCtrlHandlerExA
SetServiceStatus
AllocateAndInitializeSid
shell32
ShellExecuteExW
ole32
CreateStreamOnHGlobal
CoUninitialize
CoInitializeEx
Sections
.text Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 516KB - Virtual size: 516KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 593KB - Virtual size: 755KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ