C:\CAMBLP\HSAFKPGT\DEETZJOAHC.PDB
Static task
static1
Behavioral task
behavioral1
Sample
012fc4e8943f6b5f4998aa156fb7ff50_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
012fc4e8943f6b5f4998aa156fb7ff50_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
012fc4e8943f6b5f4998aa156fb7ff50_NeikiAnalytics
-
Size
302KB
-
MD5
012fc4e8943f6b5f4998aa156fb7ff50
-
SHA1
41b7c71cabaf1ba72efa29b346edd19ea4a561ea
-
SHA256
950c88b74484179e8f65a8d5af31352951dfc53d8e75cbbbe6dffc9ec3a2df1f
-
SHA512
4e586cb8a3c00764decfc2c6db94ff2bfc95e70b2e45ad25c29c40fc1a020f23df5488508b29399fdf4271c0a59af3fb00fef7a78d0f794c8cdddc03b2e33803
-
SSDEEP
6144:TBgbJaavboSG75Z0Mu1S4Yl3DTXmGlvPAUUFxdRxivAD9:OSlnmuPLEGA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 012fc4e8943f6b5f4998aa156fb7ff50_NeikiAnalytics
Files
-
012fc4e8943f6b5f4998aa156fb7ff50_NeikiAnalytics.exe windows:4 windows x86 arch:x86
edeecded1af5d7d293d9527ba7dc82d4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitCommonControlsEx
comdlg32
LoadAlterBitmap
wininet
FindNextUrlCacheEntryA
InternetGetCookieA
RetrieveUrlCacheEntryStreamA
InternetAlgIdToStringA
InternetCombineUrlA
InternetSetOptionW
InternetConfirmZoneCrossing
kernel32
GetModuleHandleA
TerminateProcess
InterlockedExchange
GetFullPathNameW
FlushFileBuffers
FreeLibrary
Sleep
IsDebuggerPresent
VirtualFree
GetModuleFileNameA
LockFile
HeapAlloc
ReadFile
GetCommandLineA
HeapDestroy
TlsAlloc
GetConsoleCP
GetTimeFormatA
HeapSize
GetEnvironmentStrings
GetCurrentProcessId
TlsFree
ExitProcess
SetConsoleCtrlHandler
GetLastError
CreateFileA
LCMapStringA
FreeEnvironmentStringsW
GetModuleHandleW
InterlockedIncrement
CompareStringA
HeapReAlloc
LCMapStringW
GetLogicalDriveStringsW
SetHandleCount
GetConsoleMode
EnterCriticalSection
CompareStringW
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
GetTickCount
HeapFree
HeapCreate
GetLocaleInfoW
UnhandledExceptionFilter
LeaveCriticalSection
SetCurrentDirectoryW
GetCurrentThread
RtlMoveMemory
GetExitCodeProcess
GetTimeZoneInformation
WriteConsoleA
VirtualAlloc
GetSystemTimeAsFileTime
CloseHandle
LoadLibraryA
GetFileType
GetCurrentThreadId
WriteFile
GetDateFormatA
VirtualQuery
FreeEnvironmentStringsA
RtlUnwind
EnumSystemLocalesA
GetUserDefaultLCID
SetLastError
GlobalLock
CreateMutexA
GetCPInfo
GetStdHandle
InterlockedDecrement
GetStringTypeW
WriteConsoleW
SetEnvironmentVariableA
GetStartupInfoA
MultiByteToWideChar
GetLocaleInfoA
GetOEMCP
DeleteCriticalSection
lstrcpynW
QueryPerformanceCounter
WideCharToMultiByte
IsValidCodePage
GetConsoleOutputCP
TlsGetValue
GetEnvironmentStringsW
GetStringTypeA
SetFilePointer
GetACP
TlsSetValue
OpenMutexA
SetUnhandledExceptionFilter
GetProcAddress
IsValidLocale
advapi32
GetUserNameA
StartServiceA
RegLoadKeyW
LogonUserW
CryptSetProviderExW
LookupSecurityDescriptorPartsA
CreateServiceW
shell32
ShellAboutA
DragQueryPoint
user32
IntersectRect
AdjustWindowRectEx
IsWindowEnabled
SetParent
LoadAcceleratorsW
SetDoubleClickTime
MoveWindow
FillRect
GetListBoxInfo
RegisterDeviceNotificationW
DlgDirListA
GetAsyncKeyState
RegisterClassA
EnableWindow
SetDebugErrorLevel
CreateWindowExW
CallMsgFilterW
ShowWindow
CreateWindowExA
DrawIconEx
RegisterClassExA
GetUserObjectInformationA
IsDialogMessageA
DestroyAcceleratorTable
GetClipboardFormatNameW
MessageBoxW
VkKeyScanA
ReleaseCapture
LoadBitmapW
RegisterDeviceNotificationA
Sections
.text Size: 182KB - Virtual size: 182KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ