d:\workspace\memu-service\Release\MemuService.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b519620cdfa354ece796eddc989e2b10_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b519620cdfa354ece796eddc989e2b10_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
b519620cdfa354ece796eddc989e2b10_NeikiAnalytics
-
Size
1.3MB
-
MD5
b519620cdfa354ece796eddc989e2b10
-
SHA1
225e407e2d50aa8f660801ea52f894501cce2b76
-
SHA256
fd527e52cb22eb9783c7bb33d8f74310e34b217d8b22832516b3080dcf53f1ac
-
SHA512
6a94b80f22f4c692df3f85b89c31a5fa8a9a121e6256c844dca4ed4b5dc40c404bc3d38e5b9845785fc3f91832e7d657a029bb9e23e97ce22d1252407b7a7b85
-
SSDEEP
12288:IjuZDtm1aUiPrfUQhQ67sv7mfYTpKk2nneoJcR5QBjvrEH7t+G:gsdZjHhQ6giafmvJW5SrEH7N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b519620cdfa354ece796eddc989e2b10_NeikiAnalytics
Files
-
b519620cdfa354ece796eddc989e2b10_NeikiAnalytics.exe windows:5 windows x86 arch:x86
a67cfb1a47aaea25758de29f3e1e21ba
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLastError
GetProcAddress
LoadLibraryA
ProcessIdToSessionId
WritePrivateProfileStringA
WTSGetActiveConsoleSessionId
GetCurrentThreadId
WinExec
CreateThread
Sleep
FlushFileBuffers
WriteConsoleW
SetStdHandle
HeapReAlloc
LoadLibraryW
GetConsoleMode
GetConsoleCP
FreeLibrary
CloseHandle
CreateToolhelp32Snapshot
Process32Next
SetLastError
GetLogicalDriveStringsA
OpenProcess
Process32First
QueryDosDeviceA
GetModuleHandleA
MultiByteToWideChar
GetModuleFileNameA
SetFilePointer
GetStringTypeW
DecodePointer
EncodePointer
GetCommandLineA
HeapSetInformation
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
IsProcessorFeaturePresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
WriteFile
GetStdHandle
GetModuleFileNameW
HeapSize
ExitProcess
EnterCriticalSection
LeaveCriticalSection
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
LCMapStringW
CreateFileW
user32
CloseDesktop
OpenWindowStationA
SetThreadDesktop
SetProcessWindowStation
OpenDesktopA
GetThreadDesktop
CloseWindowStation
GetProcessWindowStation
advapi32
RegisterServiceCtrlHandlerExA
StartServiceCtrlDispatcherA
AdjustTokenPrivileges
DuplicateTokenEx
LookupPrivilegeValueA
SetTokenInformation
CreateProcessAsUserA
OpenProcessToken
SetServiceStatus
psapi
GetProcessImageFileNameA
wtsapi32
WTSQueryUserToken
userenv
CreateEnvironmentBlock
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE