J:\TitAN\Vodka\MHSource\Obj\MHClient\Release\MHClient-Connect.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1847a27d2feeab3d36c23747a6a4b3c0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1847a27d2feeab3d36c23747a6a4b3c0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
1847a27d2feeab3d36c23747a6a4b3c0_NeikiAnalytics
-
Size
4.2MB
-
MD5
1847a27d2feeab3d36c23747a6a4b3c0
-
SHA1
a55d0036486e28feb83a06681c4dd8b426606684
-
SHA256
eed0624bfe727e65e5dc2a51fc4eb5d87e1fdf58b14fe2f2ddef7c071805754c
-
SHA512
4596acb4511cc52f0c8a1dd16cd32ea54a63cce253bc3f0768c54b796e5f14dae155f24cb0ac5d73d85da91e974c7178c15179dbac852867c26ffde94de56603
-
SSDEEP
49152:o4UWGmsdIXiWCuqDN9d7ySh0VJhc3ijwbHbZHbKXtyTmGp3BELRc67VwH:47lhqgdhTtUc676H
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1847a27d2feeab3d36c23747a6a4b3c0_NeikiAnalytics
Files
-
1847a27d2feeab3d36c23747a6a4b3c0_NeikiAnalytics.exe windows:5 windows x86 arch:x86
da548b78e7043934df5d95f7cea25a86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
soundlib
CreateSoundLib
winmm
timeGetTime
ss3dgfunc
_RotatePositionWithPivot@24
_CalcDistance@8
_MatrixMultiply2@12
_TransformV3TOV4@16
_SetInverseMatrix@8
_TransformVector3_VPTR2@16
_SetRotationYMatrix@8
_SetRotationXMatrix@8
_Normalize@8
_VECTOR3_ADD_VECTOR3@12
_VECTOR3_MULEQU_FLOAT@8
_WriteTGA@24
_COLORtoDWORD@16
_VECTOR3Length@4
_CrossProduct@12
wsock32
inet_addr
gethostbyname
WSAStartup
WSACleanup
closesocket
send
recv
htons
ioctlsocket
socket
connect
dinput8
DirectInput8Create
wininet
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
InternetQueryDataAvailable
HttpSendRequestA
InternetConnectA
HttpOpenRequestA
kernel32
GetStringTypeW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
LoadLibraryW
SetConsoleCtrlHandler
GetTimeZoneInformation
OutputDebugStringA
GetFileSize
CloseHandle
OpenFile
GetLocalTime
IsDBCSLeadByte
GetModuleFileNameA
DeleteFileA
GetTickCount
Sleep
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetCurrentDirectoryA
ReadFile
WaitForSingleObject
CreateProcessA
GetStartupInfoA
CreatePipe
WideCharToMultiByte
lstrlenA
SetCurrentDirectoryA
Process32Next
Module32Next
Module32First
Process32First
CreateToolhelp32Snapshot
lstrcpyA
lstrcmpA
GetProcAddress
LoadLibraryA
FreeLibrary
CreateFileA
CreateThread
CreateEventA
GetLastError
GetThreadContext
ResumeThread
SetEvent
GetPriorityClass
OpenProcess
lstrcatA
QueryDosDeviceA
lstrcmpiA
GetLogicalDriveStringsA
WaitForMultipleObjects
TerminateProcess
IsDebuggerPresent
InterlockedCompareExchange
GetModuleHandleA
CompareStringW
VerifyVersionInfoA
VerSetConditionMask
GetCurrentProcess
DuplicateHandle
GetCurrentProcessId
GetProcessId
ExitProcess
WriteFile
CreateDirectoryA
FindClose
FindNextFileA
GetUserDefaultLCID
FindFirstFileA
WriteProcessMemory
FileTimeToSystemTime
GetWindowsDirectoryA
LocalAlloc
GetSystemDefaultLangID
MultiByteToWideChar
LCMapStringA
InterlockedExchange
InitializeCriticalSection
SetUnhandledExceptionFilter
DeleteCriticalSection
GetCurrentThread
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
WritePrivateProfileStringA
GetPrivateProfileStringA
GetTempPathA
CopyFileA
SetFileAttributesA
GetVersionExA
GetSystemTime
InterlockedDecrement
DeviceIoControl
HeapDestroy
HeapCreate
IsValidCodePage
GetOEMCP
GetACP
GetConsoleMode
GetConsoleCP
SetFilePointer
FatalAppExitA
GetLocaleInfoW
HeapSize
InitializeCriticalSectionAndSpinCount
SetHandleCount
SetLastError
TlsFree
TlsSetValue
SetEnvironmentVariableA
TlsGetValue
TlsAlloc
IsProcessorFeaturePresent
UnhandledExceptionFilter
GetCPInfo
LCMapStringW
GetModuleFileNameW
GetStdHandle
GetFileType
WriteConsoleW
GetStartupInfoW
HeapSetInformation
GetCommandLineA
GetFileAttributesA
GetModuleHandleW
HeapReAlloc
ExitThread
HeapAlloc
HeapFree
FindFirstFileExA
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
RaiseException
RtlUnwind
DecodePointer
EncodePointer
InterlockedIncrement
GetLocaleInfoA
SetEndOfFile
CreateFileW
EnumSystemLocalesA
IsValidLocale
SetStdHandle
GetProcessHeap
LocalFree
lstrlenW
RemoveDirectoryA
VirtualQuery
MulDiv
user32
GetWindowTextA
wsprintfA
SetRect
MessageBoxA
CharNextA
CharPrevA
PostMessageA
CloseClipboard
SendMessageA
GetClientRect
SetCursor
LoadCursorFromFileA
GetActiveWindow
RegisterHotKey
PeekMessageA
TranslateMessage
DispatchMessageA
LoadIconA
RegisterClassExA
DefWindowProcA
EndDialog
GetSystemMetrics
CreateWindowExA
ShowWindow
UpdateWindow
ShowCursor
FindWindowExA
FindWindowA
GetDC
ReleaseDC
SetCapture
ReleaseCapture
GetCursorPos
ScreenToClient
GetClipboardData
OffsetRect
EnumWindows
IsClipboardFormatAvailable
GetWindowThreadProcessId
CopyRect
OpenClipboard
EmptyClipboard
SetClipboardData
gdi32
GetStockObject
GetDeviceCaps
SelectObject
GetTextExtentPoint32A
CreateFontIndirectA
DeleteObject
advapi32
LookupAccountSidA
GetTokenInformation
RegCloseKey
RegQueryValueExA
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
RegOpenKeyExA
RegQueryInfoKeyA
OpenThreadToken
GetUserNameA
AllocateAndInitializeSid
InitializeAcl
AddAccessDeniedAce
AddAccessAllowedAce
SetSecurityInfo
FreeSid
shell32
ShellExecuteA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
CoInitializeSecurity
CoInitializeEx
CoSetProxyBlanket
CoFreeUnusedLibraries
oleaut32
CreateErrorInfo
GetErrorInfo
SetErrorInfo
VariantInit
VariantClear
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayGetElement
SysAllocString
SysFreeString
VariantChangeType
freeimage
_FreeImage_GetInfo@4
_FreeImage_Unload@4
_FreeImage_GetBits@4
_FreeImage_ConvertTo16Bits565@4
_FreeImage_Load@12
_FreeImage_SaveJPEG@12
psapi
GetProcessImageFileNameA
iphlpapi
GetAdaptersInfo
Sections
.textbss Size: - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 357KB - Virtual size: 357KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 839KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ