t:\clview\x86\ship\0\clview.pdb
Static task
static1
Behavioral task
behavioral1
Sample
39832173f78189eb8b7491dea01664d0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
39832173f78189eb8b7491dea01664d0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
39832173f78189eb8b7491dea01664d0_NeikiAnalytics
-
Size
1.6MB
-
MD5
39832173f78189eb8b7491dea01664d0
-
SHA1
00e564ea86c7000afcfcc86c79ae91b11a8a2ee2
-
SHA256
d0aca85b3356dc1e45c6550918fb5440e1d3703c2661d19fc5049a4dc185996a
-
SHA512
5db56b3f3cdbc9dcb8530a88d32d016e8619bea178dd9bda3805dfa268dda343f53e81a30dd287b8075924ebe8e4e8188da544032178cf0f06b90afb253620e9
-
SSDEEP
12288:M0H4KiIQ2slrIxn85c6S4Hb4849nIYVjIlCOU4hog96o2gZ:fYKiIClr65gcTVjUCs2Vo2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39832173f78189eb8b7491dea01664d0_NeikiAnalytics
Files
-
39832173f78189eb8b7491dea01664d0_NeikiAnalytics.exe windows:4 windows x86 arch:x86
b525b133652cd0240e3f916da9fb0c1f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
CreateSolidBrush
DeleteObject
kernel32
RaiseException
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
GetCurrentProcess
GetCurrentThreadId
SetLastError
MulDiv
GetCommandLineW
FreeLibrary
InitializeCriticalSection
DeleteCriticalSection
lstrlenW
GetLastError
lstrcmpiW
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleHandleW
GetModuleFileNameW
DeleteFileW
MoveFileExW
CloseHandle
WriteFile
ReadFile
GetFileSize
GlobalUnlock
GlobalLock
GlobalAlloc
GetUserDefaultLCID
lstrlenA
GetTempFileNameW
GetTempPathW
CreateThread
FindClose
FindFirstFileW
GetLongPathNameW
WaitForSingleObject
ReleaseMutex
CreateMutexW
WideCharToMultiByte
CreateProcessW
ProcessIdToSessionId
GetCurrentProcessId
LocalAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
LoadLibraryW
GetTempPathA
GetTempFileNameA
CreateProcessA
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
VirtualProtect
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcAddress
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
Sleep
TlsGetValue
user32
GetMenuStringW
GetCursorPos
FrameRect
AdjustWindowRect
InflateRect
ModifyMenuW
FindWindowExW
GetClassNameW
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
CreatePopupMenu
MessageBeep
AppendMenuW
KillTimer
TrackPopupMenu
CharNextW
GetKeyState
SetWindowLongW
GetWindowLongW
CallWindowProcW
SendMessageW
GetClientRect
ShowWindow
GetClassInfoExW
LoadCursorW
DefWindowProcW
SetTimer
MapVirtualKeyW
DestroyIcon
GetWindowPlacement
SetWindowPlacement
SetWindowTextW
MessageBoxW
PostMessageW
GetSystemMetrics
GetTopWindow
GetForegroundWindow
BringWindowToTop
GetWindow
EnumWindows
SendMessageTimeoutW
GetParent
MonitorFromWindow
GetMonitorInfoW
SetWindowPos
SystemParametersInfoW
IsWindowVisible
GetWindowRect
LoadIconW
MapWindowPoints
CopyRect
DestroyWindow
CreateWindowExW
RegisterClassExW
UnregisterClassA
msocf
?CreateTheApp@Frame@MsoCF@@YGXAAUCreateTheAppArgs@12@@Z
?TheApp@Frame@MsoCF@@YGPAUAFrameApp@2@XZ
?TerminateTheApp@Frame@MsoCF@@YGXXZ
?Finish@Frame@MsoCF@@YGXXZ
?Finish@Utilities@MsoCF@@YGXXZ
??0CToolbarData@MsoCF@@QAE@XZ
?Init@CToolbarData@MsoCF@@QAGXPBUStaticToolbarDesc@2@IPBUStaticMenuDesc@2@I@Z
?g_FixedBufferAllocator@MsoCF@@3VCFixedBufferAllocator@1@A
?SetWzFromNumber@Strings@MsoCF@@YGXAAV?$CWzInBuffer_T@V?$String@UWzTraits@MsoCF@@@MsoCF@@V?$CBuffer@_W@2@@2@IHHPAH@Z
?g_FastBufferAllocator@MsoCF@@3VCFastBufferAllocator@1@A
?AppendArrayOfCharactersToWz@Strings@MsoCF@@YGXPB_WHAAV?$CWzInBuffer_T@V?$String@UWzTraits@MsoCF@@@MsoCF@@V?$CBuffer@_W@2@@2@PAH@Z
?SetWzFromResource@Strings@MsoCF@@YGXAAV?$CWzInBuffer_T@V?$String@UWzTraits@MsoCF@@@MsoCF@@V?$CBuffer@_W@2@@2@PAUHINSTANCE__@@IPAH@Z
?CreateActionManager@MsoCF@@YGXPAPAUIActionManager@1@@Z
??1CToolbarData@MsoCF@@QAE@XZ
?Start@Utilities@MsoCF@@YGXHPAU_msotcfcf@@@Z
?Start@Frame@MsoCF@@YGXXZ
?SetWtzFromPattern@Strings@MsoCF@@YGXAAV?$CWtzInBuffer_Template@V?$CBuffer@_W@MsoCF@@@2@PAUHINSTANCE__@@IQAPB_WH@Z
?SetWzFromPattern@Strings@MsoCF@@YGXAAV?$CWzInBuffer_T@V?$String@UWzTraits@MsoCF@@@MsoCF@@V?$CBuffer@_W@2@@2@PAUHINSTANCE__@@IQAPB_WHPAH@Z
?Free@Allocator@Memory@MsoCF@@YGXPAX@Z
?TheActionManager@MsoCF@@YGPAUIActionManager@1@XZ
?Set@Properties@MsoCF@@YGXPAUIPropertySet@2@ABUPropertyInfo@2@PBXW4PropertyType@2@@Z
?LookupProperty@MsoCF@@YGABUPropertyInfo@1@I@Z
?FGet@Properties@MsoCF@@YG_NPAUIPropertySet@2@PBUPropertyInfo@2@PAXHW4PropertyType@2@@Z
?FreeAndZero_ComplexType@CPropertyData@MsoCF@@SGXPAXW4PropertyType@2@@Z
?ProduceAtom@MsoCF@@YGXPAPAVIAtom@1@PBXH@Z
?GetProperty@IPropertySet@MsoCF@@QAGXABUPropertyInfo@2@PAVCPropertyValue@2@@Z
?RegisterPropertySpace@MsoCF@@YGXPBUPropertySpaceInfo@1@@Z
msvcr80
_onexit
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_controlfp_s
_invoke_watson
_crt_debugger_hook
_except_handler4_common
_decode_pointer
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
??3@YAXPAX@Z
??_V@YAXPAX@Z
__CxxFrameHandler3
_CxxThrowException
??_U@YAPAXI@Z
swprintf_s
memset
_recalloc
??2@YAPAXI@Z
malloc
free
memcpy_s
wcsncpy_s
_vsnprintf
_vsnwprintf
memcpy
_wtoi
_wcsdup
_wtol
vswprintf_s
wcsrchr
wcscpy_s
vsprintf_s
fclose
fwprintf_s
fopen_s
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
oleaut32
VariantInit
SysFreeString
VarUI4FromStr
SysAllocString
VariantClear
shlwapi
PathCreateFromUrlW
AssocQueryStringW
shell32
CommandLineToArgvW
SHFileOperationW
wininet
InternetErrorDlg
HttpQueryInfoW
InternetOpenW
InternetReadFile
InternetCloseHandle
InternetOpenUrlW
urlmon
URLDownloadToFileW
ObtainUserAgentString
Sections
.text Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.4MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE