msdtcexe.pdb
Static task
static1
General
-
Target
dc7905063e1a5e503d0656edfba18f60_NeikiAnalytics
-
Size
1.6MB
-
MD5
dc7905063e1a5e503d0656edfba18f60
-
SHA1
b2428e01fce20bb445f1891701c598490ad0d63f
-
SHA256
0398bfcea7bbbb27386f94f4523e444abaccbdd9e50d3dd998d8fc24b71280cb
-
SHA512
32df97ed5efbb48ae059f4ab99b7340c1318829d09aa931ea33bd86242ef5c48ba6e1b648b7936698f37aff283243f5e07dda9c1ca927599bb7e46df6d25d531
-
SSDEEP
12288:LlpkyPXc3ajG+hjQKymY8efKCpD7Gj9G6G1qT8nQkCu83L3Wl/np9DBDt3kbE:LlKyPsqjnhMgeiCl7G0nehbGZpbD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dc7905063e1a5e503d0656edfba18f60_NeikiAnalytics
Files
-
dc7905063e1a5e503d0656edfba18f60_NeikiAnalytics.exe windows:10 windows x64 arch:x64
c7eb11f3b872a54495faea7060d3e758
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
api-ms-win-core-processenvironment-l1-1-0
GetCommandLineA
ExpandEnvironmentStringsW
GetCommandLineW
api-ms-win-core-com-l1-1-0
CoInitializeEx
CoTaskMemAlloc
StringFromGUID2
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoGetObjectContext
msvcrt
wcschr
_CxxThrowException
__dllonexit
_unlock
_lock
?terminate@@YAXXZ
_local_unwind
_commode
_fmode
_wcmdln
memcmp
__C_specific_handler
_initterm
__setusermatherr
memcpy
_cexit
_exit
exit
_onexit
__set_app_type
__wgetmainargs
_amsg_exit
fopen
fflush
fclose
fprintf
fwprintf
__CxxFrameHandler3
_vsnwprintf
_wcsicmp
_stricmp
memcpy_s
_purecall
??1exception@@UEAA@XZ
??0exception@@QEAA@XZ
??0exception@@QEAA@AEBV0@@Z
_vsnprintf_s
memmove_s
wcsrchr
_waccess
??0exception@@QEAA@AEBQEBDH@Z
?what@exception@@UEBAPEBDXZ
strchr
_wfopen
??1type_info@@UEAA@XZ
_XcptFilter
_callnewh
malloc
free
memset
msdtctm
ord4
ntdll
RtlVirtualUnwind
RtlReportException
RtlLookupFunctionEntry
RtlCaptureContext
api-ms-win-core-synch-l1-2-0
Sleep
api-ms-win-core-processthreads-l1-1-0
GetCurrentProcess
TlsFree
TlsAlloc
CreateProcessW
GetExitCodeProcess
GetCurrentThreadId
GetCurrentProcessId
TerminateProcess
GetStartupInfoW
TlsGetValue
OpenProcessToken
api-ms-win-core-errorhandling-l1-1-0
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
api-ms-win-core-libraryloader-l1-2-0
GetProcAddress
FindResourceExW
FreeLibrary
LoadLibraryExW
GetModuleFileNameW
LoadResource
LockResource
LoadStringW
GetModuleHandleExW
GetModuleFileNameA
GetModuleHandleW
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-sysinfo-l1-1-0
GetSystemTimeAsFileTime
GetTickCount
GetLocalTime
GetSystemWindowsDirectoryA
api-ms-win-core-registry-l1-1-0
RegOpenKeyExA
RegOpenKeyExW
RegCloseKey
RegSetValueExW
RegQueryValueExA
RegQueryValueExW
api-ms-win-core-file-l1-1-0
CreateFileW
FindClose
DeleteFileW
CreateDirectoryW
GetFullPathNameW
FindFirstFileW
FindNextFileW
SetFileAttributesW
api-ms-win-core-debug-l1-1-0
OutputDebugStringW
DebugBreak
IsDebuggerPresent
api-ms-win-core-synch-l1-1-0
SetEvent
ResetEvent
CreateMutexExW
AcquireSRWLockShared
DeleteCriticalSection
ReleaseMutex
WaitForSingleObjectEx
AcquireSRWLockExclusive
OpenSemaphoreW
InitializeCriticalSectionAndSpinCount
InitializeCriticalSectionEx
LeaveCriticalSection
ReleaseSemaphore
ReleaseSRWLockExclusive
WaitForSingleObject
EnterCriticalSection
ReleaseSRWLockShared
CreateEventA
CreateSemaphoreExW
api-ms-win-core-handle-l1-1-0
CloseHandle
api-ms-win-core-psapi-l1-1-0
QueryFullProcessImageNameW
api-ms-win-core-heap-l1-1-0
HeapFree
GetProcessHeap
HeapAlloc
api-ms-win-core-threadpool-l1-2-0
CloseThreadpoolTimer
SetThreadpoolTimer
CreateThreadpoolTimer
WaitForThreadpoolTimerCallbacks
api-ms-win-core-localization-l1-2-0
FormatMessageW
api-ms-win-core-string-l1-1-0
MultiByteToWideChar
api-ms-win-core-version-l1-1-0
VerQueryValueW
api-ms-win-core-heap-l2-1-0
LocalFree
LocalAlloc
api-ms-win-security-base-l1-1-0
GetTokenInformation
kernel32
UnregisterWaitEx
QueueUserWorkItem
api-ms-win-core-delayload-l1-1-1
ResolveDelayLoadedAPI
api-ms-win-core-delayload-l1-1-0
DelayLoadFailureHook
Sections
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE