ehSched.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5692edca13447d1e1f1f32eed139f640_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5692edca13447d1e1f1f32eed139f640_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
5692edca13447d1e1f1f32eed139f640_NeikiAnalytics
-
Size
691KB
-
MD5
5692edca13447d1e1f1f32eed139f640
-
SHA1
bed9ae612ea7be8be7d564f97627a72ead38e0ef
-
SHA256
c296e5b1be6b06c82728a174fb4c2228b7978610dd92420f48bc8c6381c08481
-
SHA512
6c6200490323850c2e80ec0289e85e3e47516e4301cba0e31748f1e5bd954c37e0222cc18929b0887e146f436ad104b2505d6f112cbe58f99a23eda5509364ea
-
SSDEEP
12288:hwXAwhilnybqL5tml0aTcMjN12xdUb6pSsFQHNP51lK9+Prapve43kT:SQwhil11tmlNQ2OnBdFQtP51llPup33Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5692edca13447d1e1f1f32eed139f640_NeikiAnalytics
Files
-
5692edca13447d1e1f1f32eed139f640_NeikiAnalytics.exe windows:6 windows x64 arch:x64
56bc9adcf5c93d8b8dc9fbe590f176c4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegisterEventSourceW
ReportEventW
DeregisterEventSource
RegDeleteKeyW
RegQueryValueExW
OpenSCManagerW
OpenServiceW
CloseServiceHandle
CreateServiceW
ChangeServiceConfig2W
ControlService
DeleteService
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerExW
SetServiceStatus
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
AddAccessAllowedAce
AddAce
GetAce
GetAclInformation
InitializeAcl
GetLengthSid
IsValidSid
LookupAccountNameW
OpenThreadToken
GetTokenInformation
SetSecurityDescriptorGroup
CopySid
SetNamedSecurityInfoW
LookupAccountSidW
SetSecurityDescriptorOwner
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
GetSecurityDescriptorDacl
CreateWellKnownSid
OpenProcessToken
kernel32
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CloseHandle
MultiByteToWideChar
CreateWaitableTimerW
CancelWaitableTimer
SetWaitableTimer
SetEvent
CreateEventW
CreateThread
WaitForSingleObject
ExitThread
ResetEvent
GetCurrentThreadId
CreateEventExW
OpenThread
WaitForMultipleObjects
HeapSetInformation
GetCommandLineW
GetCurrentThread
QueryPerformanceCounter
GetTickCount64
QueryPerformanceFrequency
QueueUserWorkItem
GetSystemTimeAsFileTime
OutputDebugStringA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
GetTickCount
SetUnhandledExceptionFilter
GetStartupInfoW
Sleep
GetVersionExA
RaiseException
lstrcmpiW
GetModuleHandleW
LoadLibraryW
GetProcAddress
GetLastError
lstrlenW
FreeLibrary
GetProcessHeap
HeapFree
HeapAlloc
InitializeCriticalSection
EncodeSystemPointer
LocalFree
OutputDebugStringW
GetLocalTime
user32
UnregisterClassA
PostThreadMessageW
UnregisterDeviceNotification
RegisterDeviceNotificationW
DispatchMessageW
PeekMessageW
MsgWaitForMultipleObjectsEx
CharNextW
msvcrt
__setusermatherr
_commode
_fmode
__set_app_type
?terminate@@YAXXZ
realloc
_errno
_amsg_exit
_initterm
fflush
exit
_cexit
_exit
_XcptFilter
__wgetmainargs
__CxxFrameHandler3
_CxxThrowException
__C_specific_handler
memset
_vsnwprintf
?what@exception@@UEBAPEBDXZ
??0exception@@QEAA@XZ
??0exception@@QEAA@AEBV0@@Z
??1exception@@UEAA@XZ
??0exception@@QEAA@AEBQEBD@Z
memmove_s
calloc
_resetstkoflw
_wcsnicmp
wcscat_s
wcscpy_s
memcpy_s
free
malloc
wcsncpy_s
fputws
??1type_info@@UEAA@XZ
_onexit
_lock
__dllonexit
_wcmdln
_unlock
_purecall
memcpy
ole32
CoInitializeSecurity
CoRevertToSelf
CoSetProxyBlanket
CoImpersonateClient
CoInitialize
CoReleaseServerProcess
CoRegisterClassObject
CoUninitialize
CoRevokeClassObject
CoInitializeEx
CoAddRefServerProcess
StringFromGUID2
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
oleaut32
VarUI4FromStr
SysFreeString
slc
SLGetWindowsInformationDWORD
Sections
.text Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE