sppsvc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
055bdd297b4231a3d6efb5f0930c3400_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
055bdd297b4231a3d6efb5f0930c3400_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
055bdd297b4231a3d6efb5f0930c3400_NeikiAnalytics
-
Size
3.9MB
-
MD5
055bdd297b4231a3d6efb5f0930c3400
-
SHA1
64134995c80d7fcc954e7b70ae3d7ccc9f6f8bd3
-
SHA256
3a2410333ed9946a8ce4ed9b0d7dc00b1743be1dcec43935b2db499bde3369c4
-
SHA512
7808145a4ea2d75493c56599320b2cf9c21393baab5086353acd640d37ff6e73712101470e8befbaeb3190b2a538e09b179074a0d2880d0dfac5fa8aebcfc1ba
-
SSDEEP
49152:4adpFcx1nkQoqvUbvgXELEnAR0gXV/XB+7nZE1GhnuFnNeNMWo8CWgiV5omI05ID:7Fcxeecao3yudFnN0DHIeYNdX0Q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 055bdd297b4231a3d6efb5f0930c3400_NeikiAnalytics
Files
-
055bdd297b4231a3d6efb5f0930c3400_NeikiAnalytics.exe windows:6 windows x64 arch:x64
7bcaa6f7c2a49f73d8165171f14f2bd5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
TraceMessage
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
RegisterTraceGuidsW
UnregisterTraceGuids
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
SetServiceStatus
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
FreeSid
AllocateAndInitializeSid
CheckTokenMembership
ConvertStringSidToSidW
RegSetKeySecurity
RegCreateKeyExW
RegDeleteValueW
RegQueryInfoKeyW
RegEnumKeyW
RegSetValueExW
RegDeleteKeyW
RegisterEventSourceW
ReportEventW
DeregisterEventSource
CryptGenRandom
CryptAcquireContextW
CryptReleaseContext
ConvertSidToStringSidW
OpenProcessToken
EqualSid
GetTokenInformation
RegEnumKeyExW
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptDestroyKey
CryptEncrypt
CryptDecrypt
CryptImportKey
CryptSignHashA
CryptVerifySignatureA
CryptExportKey
CryptGenKey
RegisterTraceGuidsA
LookupAccountNameW
kernel32
CreateEventW
RegisterWaitForSingleObject
CreateTimerQueue
CreateTimerQueueTimer
GetModuleHandleExW
UnregisterWaitEx
DeleteTimerQueue
DecodePointer
DeleteTimerQueueEx
EncodePointer
FileTimeToSystemTime
CreateMutexW
OpenMutexW
ReleaseMutex
GetTickCount
CreateSemaphoreW
GetDateFormatW
GetTimeFormatW
ExpandEnvironmentStringsW
MultiByteToWideChar
CreateFileW
GetFileSize
ReadFile
QueueUserWorkItem
GetCurrentProcessId
OpenProcess
WriteFile
GetFileAttributesW
SetFileAttributesW
ChangeTimerQueueTimer
CreateDirectoryW
GetFileSizeEx
GetSystemInfo
SystemTimeToFileTime
CompareFileTime
GetSystemTimeAsFileTime
lstrlenW
RaiseException
GetModuleHandleA
WaitForMultipleObjects
GetDevicePowerState
CreateSemaphoreA
GetPrivateProfileStringW
GetFullPathNameW
InitializeCriticalSection
GetVersion
VirtualAlloc
SetLastError
VirtualFree
GetLocalTime
DeleteFileW
FlushFileBuffers
CopyFileW
MoveFileExW
SetFilePointer
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetVersionExA
WideCharToMultiByte
GetComputerNameW
DeviceIoControl
LCMapStringW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
GetLocaleInfoW
GetSystemDirectoryW
UnhandledExceptionFilter
TerminateProcess
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetProcAddress
LoadLibraryW
VirtualQuery
FreeLibrary
Sleep
GetVersionExW
WaitForSingleObject
SetEvent
ReleaseSemaphore
HeapSetInformation
LeaveCriticalSection
EnterCriticalSection
DeleteTimerQueueTimer
GetCurrentThreadId
LocalFree
DeleteCriticalSection
SetThreadPriority
GetThreadPriority
GetCurrentProcess
DuplicateHandle
GetCurrentThread
GetLastError
OpenThread
CloseHandle
LocalAlloc
GetProcessHeap
HeapFree
HeapAlloc
VirtualProtect
msvcrt
memmove
swscanf
_wcsicmp
wcschr
sscanf
_wtof
_wtoi
memcmp
_vsnwprintf
_itow
rand
srand
time
_vscwprintf
_beginthreadex
_ui64tow
malloc
free
?terminate@@YAXXZ
memset
memcpy
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_fmode
_commode
__setusermatherr
_amsg_exit
_initterm
exit
_cexit
_exit
_XcptFilter
__C_specific_handler
__wgetmainargs
wcsncmp
_wcsnicmp
_purecall
rpcrt4
NdrServerCall2
RpcServerRegisterIfEx
RpcServerListen
RpcServerInqCallAttributesW
I_RpcBindingInqLocalClientPID
I_RpcMapWin32Status
RpcServerUnregisterIf
RpcMgmtStopServerListening
RpcRaiseException
RpcImpersonateClient
RpcRevertToSelfEx
UuidCreate
UuidFromStringW
RpcStringFreeW
UuidToStringW
RpcServerUseProtseqEpW
ntdll
NtQueryInformationThread
RtlEnterCriticalSection
RtlLeaveCriticalSection
RtlCopyUnicodeString
RtlCompareUnicodeString
RtlInitUnicodeString
RtlAllocateHeap
RtlFreeHeap
RtlDeleteFunctionTable
RtlInstallFunctionTableCallback
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
NtSetInformationThread
ole32
CoUninitialize
CoInitializeEx
CoInitializeSecurity
Exports
Exports
?SPRevision@@3PADA
?SPVersion@@3PADA
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 222KB - Virtual size: 222KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 576KB - Virtual size: 580KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE