d:\dbs\el\nov\target\x86\ship\xdext\x-none\msoxmlmf.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1afa19458194e56323605856fc414e80_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1afa19458194e56323605856fc414e80_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
General
-
Target
1afa19458194e56323605856fc414e80_NeikiAnalytics
-
Size
281KB
-
MD5
1afa19458194e56323605856fc414e80
-
SHA1
25d8fc80a5f5dc40a29652a1b392f59832830bb0
-
SHA256
dc31ad281b0fcee57d03f5727dbe4067d12bf7c9ebfe8f85355f0997274af7e2
-
SHA512
ecac5865e5f02287f54ffe5ffdeb92c7ce0556d45bd51f65e116c6c193516e2e7b545e9c01caa22836569b2ce3204b5ebf5c721312ae352b4bfad0f9a1c2ca15
-
SSDEEP
6144:EsJL9bSQY347G/D16yElx4ngPj1lNZJqGPHhUYG:vG5o7G/Dg9YgP9G2hUp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1afa19458194e56323605856fc414e80_NeikiAnalytics
Files
-
1afa19458194e56323605856fc414e80_NeikiAnalytics.dll regsvr32 windows:6 windows x86 arch:x86
126938702bf1d7ef0b2b9b3be548ad42
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetCurrentProcess
InitializeCriticalSectionEx
RaiseException
DecodePointer
DeleteCriticalSection
FreeLibrary
lstrcmpiW
SizeofResource
LoadResource
FindResourceW
OutputDebugStringA
EncodePointer
EnterCriticalSection
LeaveCriticalSection
CompareStringW
HeapFree
HeapAlloc
GetProcessHeap
IsDebuggerPresent
OutputDebugStringW
SetEvent
GetModuleFileNameW
LoadLibraryW
GetModuleHandleA
SetLastError
GetModuleHandleW
GetProcAddress
GetLastError
lstrlenW
GlobalFree
GlobalAlloc
MultiByteToWideChar
GetACP
ReadFile
CloseHandle
LoadLibraryExW
LoadLibraryExA
VirtualQuery
VirtualProtect
GetSystemInfo
InitializeSListHead
ResetEvent
WaitForSingleObjectEx
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
advapi32
RegisterEventSourceW
EventWriteTransfer
DeregisterEventSource
ReportEventW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
ole32
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
oleaut32
VarUI4FromStr
vcruntime140
__std_terminate
__std_type_info_destroy_list
_purecall
wcschr
wcsstr
_except_handler4_common
__CxxFrameHandler3
memset
memcpy
api-ms-win-crt-string-l1-1-0
wcsncpy_s
_wcsicmp
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vswprintf_s
__stdio_common_vswscanf
api-ms-win-crt-convert-l1-1-0
_wtoi
api-ms-win-crt-heap-l1-1-0
free
malloc
_recalloc
api-ms-win-crt-runtime-l1-1-0
_crt_atexit
_cexit
_register_onexit_function
_initterm
_initialize_narrow_environment
_execute_onexit_table
_initialize_onexit_table
_configure_narrow_argv
_errno
_invalid_parameter_noinfo
_seh_filter_dll
_initterm_e
api-ms-win-crt-locale-l1-1-0
__initialize_lconv_for_unsigned_char
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 239KB - Virtual size: 240KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ