D:\a\_work\1\s\\binaries\x86ret\bin\i386\bscmake.pdb
Static task
static1
Behavioral task
behavioral1
Sample
77c57bada4d8ca11d1bdb01600388720_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
77c57bada4d8ca11d1bdb01600388720_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
77c57bada4d8ca11d1bdb01600388720_NeikiAnalytics
-
Size
1.4MB
-
MD5
77c57bada4d8ca11d1bdb01600388720
-
SHA1
6901c948e7ee45ca48f2cb6456987434ac43ef6f
-
SHA256
7128f6905b840c7f8efc23fa0739899619daf2dd2c1e04ed5687e53ca106974c
-
SHA512
9f80a1f4211f4850bcc23e12ae0b910095b1c5fb0e7600a9d1470eec177e0a77eee31866a76557f11801ef9f68382b3f48d25b29d1d4bd116a50674d5a9613ec
-
SSDEEP
12288:K4ZDYTJfvaylw/IyES7zN4kqho3qJlW7puLThWyEIPB44CNTnpjFqQ:K4ZqJXhG/5ESOhoaJlmUvgAPS9pjY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 77c57bada4d8ca11d1bdb01600388720_NeikiAnalytics
Files
-
77c57bada4d8ca11d1bdb01600388720_NeikiAnalytics.exe windows:6 windows x86 arch:x86
44dc6374926afe4db83b100ce15a7588
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetLastError
HeapCreate
HeapDestroy
GetSystemInfo
HeapFree
HeapAlloc
SetErrorMode
VirtualQuery
GetModuleFileNameW
CreateFileW
GetFileTime
SetEndOfFile
SetFileTime
CloseHandle
FindResourceExW
LoadResource
LoadLibraryExW
GetLastError
GetEnvironmentVariableW
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
GetProcessHeap
GetUserDefaultUILanguage
FindFirstFileW
FindNextFileW
FindClose
MultiByteToWideChar
WideCharToMultiByte
GetFileType
GetConsoleMode
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
CreateEventW
WaitForSingleObjectEx
UnhandledExceptionFilter
vcruntime140
__current_exception
memset
wcsrchr
wcschr
_except_handler4_common
__current_exception_context
memcpy
memmove
api-ms-win-crt-heap-l1-1-0
realloc
calloc
_callnewh
free
_set_new_mode
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__stdio_common_vfwprintf
__stdio_common_vsnwprintf_s
__stdio_common_vswscanf
fflush
__p__commode
_read
__acrt_iob_func
_get_osfhandle
_fileno
_wsopen_s
_close
fseek
_wfsopen
getwc
ftell
api-ms-win-crt-string-l1-1-0
wcsncat_s
wcsncpy_s
iswupper
towupper
wcscspn
towlower
iswlower
_wcsicmp
strcpy_s
iswalpha
wcscpy_s
wcscat_s
api-ms-win-crt-filesystem-l1-1-0
_wstat64i32
_wfindfirst64i32
_wfindnext64i32
_findclose
_wunlink
_wsplitpath_s
_wmakepath_s
api-ms-win-crt-runtime-l1-1-0
exit
signal
terminate
_controlfp_s
__p__wpgmptr
_seh_filter_exe
_set_app_type
_errno
_configure_wide_argv
_initialize_wide_environment
_get_initial_wide_environment
_initterm
_initterm_e
_exit
_crt_atexit
__p___argc
__p___wargv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_wcserror_s
_invalid_parameter_noinfo
_initialize_onexit_table
_register_onexit_function
api-ms-win-crt-time-l1-1-0
_wutime64
api-ms-win-crt-locale-l1-1-0
setlocale
_configthreadlocale
api-ms-win-crt-environment-l1-1-0
_wgetcwd
api-ms-win-crt-convert-l1-1-0
wcstoul
_itow_s
api-ms-win-crt-conio-l1-1-0
__conio_common_vcwprintf
api-ms-win-crt-math-l1-1-0
__setusermatherr
mspdb140
?open@NameMap@@SAHPAUPDB@@HPAPAU1@@Z
?Open2W@PDB@@SAHPBGPBDPAJPAGIPAPAU1@@Z
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.4MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE