C:\Users\sddlg\Documents\Visual Studio 2013\Projects\Win32Project2\Debug\Win32Project2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3a74cdf918083731d9f3f8bfacc325c0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3a74cdf918083731d9f3f8bfacc325c0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3a74cdf918083731d9f3f8bfacc325c0_NeikiAnalytics.exe
-
Size
33KB
-
MD5
3a74cdf918083731d9f3f8bfacc325c0
-
SHA1
57a97e79f1aa321f05ba9c5c6fbd9ca450249a09
-
SHA256
dc0d4490eee4c3bb959d78818584ef68b1da63310d4a2778477a804c67ea1ec2
-
SHA512
330da90ea506187096243afdc0544879139c363fd4fb0ab2d324c32c78c616923bd9848595a37c17b353ac49c1589972f3298717599b71595e1a8bec8ea1bf4c
-
SSDEEP
384:P+3ecrq+WSOtrYq+5Hu/6VzSisYpEfblTVLC:P+3zr96rYq+e6VziYpy5Td
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a74cdf918083731d9f3f8bfacc325c0_NeikiAnalytics.exe
Files
-
3a74cdf918083731d9f3f8bfacc325c0_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
8ce8cd825a6629dfada2b02e9a912966
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FreeLibrary
VirtualQuery
GetProcessHeap
HeapFree
HeapAlloc
DecodePointer
GetSystemTimeAsFileTime
GetModuleFileNameW
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryExW
GetProcAddress
GetLastError
GetCurrentThreadId
Beep
RaiseException
IsDebuggerPresent
EncodePointer
GetModuleHandleW
user32
LoadIconA
LoadCursorA
MessageBoxA
GetClientRect
InvalidateRect
EndPaint
BeginPaint
SetTimer
ShowWindow
CreateWindowExA
RegisterClassA
PostQuitMessage
DefWindowProcA
DispatchMessageA
TranslateMessage
GetMessageA
gdi32
Ellipse
GetStockObject
msvcr120d
_XcptFilter
__crtGetShowWindowMode
_amsg_exit
__getmainargs
__set_app_type
_CrtDbgReportW
_CrtSetCheckCount
exit
_exit
_cexit
_ismbblead
_configthreadlocale
__setusermatherr
_initterm_e
_initterm
_CRT_RTC_INITW
_fmode
_commode
_crt_debugger_hook
__crtUnhandledException
__crtTerminateProcess
?terminate@@YAXXZ
__crtSetUnhandledExceptionFilter
_lock
_unlock
_calloc_dbg
__dllonexit
_onexit
_invoke_watson
_controlfp_s
_except_handler4_common
wcscpy_s
_wmakepath_s
_wsplitpath_s
_time64
srand
rand
_acmdln
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ