tracepdb.pdb
Static task
static1
Behavioral task
behavioral1
Sample
63fd355d9389189c1eefdda511187220_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
63fd355d9389189c1eefdda511187220_NeikiAnalytics
-
Size
607KB
-
MD5
63fd355d9389189c1eefdda511187220
-
SHA1
ea5c7016f00a95dbdb150114ee935df4081f867e
-
SHA256
34a5397da738fc2a5401cd0097e62202906d31c2dbc659d3c88db85a3bd71c36
-
SHA512
56b1513ece2c9796bcd1553f9bca3df18277b3676fbc14ca16dc5571f7d031be376406fd7f35174a2827e6199c38fd3df68a6a41a222addff3691a20b2f5587e
-
SSDEEP
12288:tVS6JvY67VMBNO/aXpXI22+VufvdIOKek1h4TA8bXQJYe:tVS6J17W8CX32+KJNA80T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 63fd355d9389189c1eefdda511187220_NeikiAnalytics
Files
-
63fd355d9389189c1eefdda511187220_NeikiAnalytics.exe windows:10 windows x64 arch:x64
c563af5da2261c5f1e2db0d3649c84f3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetCurrentProcess
FindFirstFileExA
GetModuleFileNameW
FindNextFileA
GetEnvironmentVariableA
FindClose
GetCurrentDirectoryA
GetModuleHandleA
GetLastError
GetProcAddress
GetFileTime
WideCharToMultiByte
GetFileSize
LocalFree
CloseHandle
FileTimeToSystemTime
MultiByteToWideChar
CreateFileW
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
Sleep
msvcrt
__setusermatherr
_cexit
_exit
__set_app_type
__getmainargs
_amsg_exit
_XcptFilter
malloc
_splitpath_s
free
printf
fputs
_makepath_s
__C_specific_handler
_vsnprintf
_vsnwprintf
exit
wprintf
_initterm
__iob_func
wcsnlen
vsprintf_s
fopen
vfprintf
_wcsicmp
fclose
strncpy_s
_wsplitpath_s
_vscprintf
fgets
strcpy_s
strncmp
strstr
strchr
strrchr
sprintf_s
__CxxFrameHandler3
??3@YAXPEAX@Z
memset
_onexit
__dllonexit
_unlock
_lock
?terminate@@YAXXZ
_commode
fprintf
_fmode
_callnewh
memcpy
memmove
strcmp
version
VerQueryValueW
GetFileVersionInfoExW
GetFileVersionInfoSizeExW
dbghelp
SymGetOptions
SymEnumTypesByName
SymCleanup
SymGetLineFromAddr64
SymUnloadModule64
SymSearch
SymGetTypeInfo
SymRegisterCallback64
SymGetSymbolFile
MakeSureDirectoryPathExists
SymInitialize
SymSetOptions
SymFromAddr
SymLoadModuleExW
Sections
.text Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 804B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE