t:\outlook\x86\ship\0\scanpst.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1cb610cdb9dae04cd56bf8b85654af80_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1cb610cdb9dae04cd56bf8b85654af80_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1cb610cdb9dae04cd56bf8b85654af80_NeikiAnalytics
-
Size
1.2MB
-
MD5
1cb610cdb9dae04cd56bf8b85654af80
-
SHA1
bce6ee3f364978a5a1151e900fd1d6ffa117af21
-
SHA256
070621dca26653757897eb00fbbb71f7819130b1a0cbbee295973970dc17ea36
-
SHA512
1d7fcc6922ccf6cd11e4c9e89dee24a175b34eb677b23792d48723b976b14ce4867fbc02347cecac2a6a7f382001b6d708a1569412ca53d112f553ea0ab9e6ba
-
SSDEEP
12288:9sKK3aAXOILyiYkqMk7+KzubUtYJPfaNiBGwLFzKGMaoQWHMI+XG9:9sTThXbqT+KzWEKS0nFz1MaoCG9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1cb610cdb9dae04cd56bf8b85654af80_NeikiAnalytics
Files
-
1cb610cdb9dae04cd56bf8b85654af80_NeikiAnalytics.exe windows:4 windows x86 arch:x86
0d9bdab8b3d52d309ed2895d7d10f0ee
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetTickCount
ReadFile
SetFilePointer
CreateFileW
GetVersionExA
FindClose
FindFirstFileW
GetFullPathNameW
GetCurrentThreadId
GetCommandLineW
GetSystemDirectoryW
LoadLibraryExW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
GetProcessHeap
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
VirtualProtect
GetCurrentProcess
CloseHandle
LoadLibraryA
SetErrorMode
lstrlenA
GetSystemDefaultLCID
lstrlenW
OutputDebugStringA
GetModuleFileNameW
SetLastError
GetLastError
GetVersion
GetFileAttributesW
GetProcAddress
GetModuleHandleW
LoadLibraryW
GetModuleHandleA
user32
UnhookWindowsHookEx
SetWindowsHookExA
RegisterWindowMessageA
LoadBitmapA
DestroyWindow
GetWindowPlacement
PostQuitMessage
DefWindowProcW
IsIconic
GetClassInfoW
SendMessageW
EnableMenuItem
GetWindowLongW
SetWindowLongW
SetClassLongA
GetDlgItemTextW
MessageBoxW
EnableWindow
SetForegroundWindow
BeginPaint
EndPaint
GetMessageA
CallNextHookEx
GetDC
ReleaseDC
GetClientRect
LoadStringW
ShowWindow
DialogBoxParamW
CreateWindowExW
RegisterClassW
GetParent
PostMessageA
CallWindowProcW
PeekMessageA
TranslateMessage
DispatchMessageA
FillRect
GetWindowTextA
SendMessageA
GetSysColor
MapWindowPoints
InvalidateRect
UpdateWindow
SetDlgItemTextW
GetWindowLongA
WinHelpA
IsDlgButtonChecked
EndDialog
SetWindowLongA
SendDlgItemMessageA
GetDlgItem
SetFocus
GetWindowRect
GetSystemMetrics
SetWindowPos
FindWindowW
LoadIconA
LoadCursorA
SetCursor
gdi32
GetPixel
DeleteDC
DeleteObject
SelectObject
BitBlt
SetTextColor
ExtTextOutA
CreateCompatibleBitmap
CreateCompatibleDC
Rectangle
GetStockObject
CreateSolidBrush
GetObjectA
LineTo
CreatePen
MoveToEx
SetBkColor
advapi32
RegQueryValueExW
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExW
olmapi32
ord259
scnpst32
RCVR_CountBlocks32@16
RCVR_Repair32@8
RCVR_Scan32@32
RCVR_Deinitialize32@0
RCVR_SetProgressCallbacks32@8
RCVR_Initialize32@8
scnpst64
RCVR_Initialize64@8
RCVR_SetProgressCallbacks64@8
RCVR_Deinitialize64@0
RCVR_Scan64@32
RCVR_Repair64@8
RCVR_CountBlocks64@16
msvcr80
_controlfp_s
_invoke_watson
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
_crt_debugger_hook
_except_handler4_common
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
memcpy
memset
_vsnwprintf
memmove
towupper
iswspace
_wtoi
_amsg_exit
Sections
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE