e:\depot\Software\Components\Echelon\Install\bin\_SetupXSO.pdb
Static task
static1
Behavioral task
behavioral1
Sample
666ab0ffe7988e0f387914e48bc852e0_NeikiAnalytics.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
666ab0ffe7988e0f387914e48bc852e0_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
General
-
Target
666ab0ffe7988e0f387914e48bc852e0_NeikiAnalytics.exe
-
Size
212KB
-
MD5
666ab0ffe7988e0f387914e48bc852e0
-
SHA1
e3de40aa60a92b15e3d365a5ddcdef52fcb180d6
-
SHA256
03e0108a76538e4d283d60ab377d7fe724a6e6c66c5de6eabf7a814b5b60de1b
-
SHA512
208c21532fdd326f52925cbc1596ff4f570409968f323ad36ac7f1f4ae5da789ffcace29a58a27aaa59d56d30bec567c45f49c6e10fad5619a7d40eca1ba9fbb
-
SSDEEP
3072:kscGKgEQO5EFIquV5mtKlIOMLi4NJIyZW+g0/NkIKbDMUXJclGtahgY6a:kscGKkyV0wlGMwkIKbClBGY6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 666ab0ffe7988e0f387914e48bc852e0_NeikiAnalytics.exe
Files
-
666ab0ffe7988e0f387914e48bc852e0_NeikiAnalytics.exe.dll windows:4 windows x86 arch:x86
8b72c88363477b64ae2a6e15f1abbb90
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
cfgmgr32
CMP_WaitNoPendingInstallEvents
setupapi
SetupCopyOEMInfA
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
newdev
UpdateDriverForPlugAndPlayDevicesA
kernel32
GetTickCount
GetProcAddress
Sleep
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetProcessHeap
HeapAlloc
HeapFree
GetFileAttributesA
GetVersionExA
LocalFree
GetLastError
WritePrivateProfileStringA
EnumSystemLocalesA
IsValidLocale
SetEndOfFile
GetLocaleInfoW
GetTimeZoneInformation
CompareStringA
CompareStringW
SetEnvironmentVariableA
LoadLibraryA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
WriteConsoleW
MoveFileA
RtlUnwind
GetCurrentThreadId
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetCurrentThread
CloseHandle
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
FatalAppExitA
VirtualAlloc
HeapReAlloc
SetFilePointer
WriteFile
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
MultiByteToWideChar
SetStdHandle
FlushFileBuffers
InitializeCriticalSection
ReadFile
CreateFileA
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
HeapSize
WriteConsoleA
GetConsoleOutputCP
DeleteFileA
user32
MessageBoxA
GetForegroundWindow
advapi32
RegQueryValueExA
OpenSCManagerA
StartServiceA
QueryServiceStatus
EnumDependentServicesA
OpenServiceA
ControlService
CloseServiceHandle
GetSecurityDescriptorDacl
SetNamedSecurityInfoA
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegOpenKeyExA
RegCloseKey
shell32
SHGetFolderPathA
ShellExecuteA
msi
ord144
ord73
Exports
Exports
?DeactivateDevToolsRepeatingFeature@@YGIKH@Z
ActivateMiniKitRepeatingFeature
ActivateNodeBuilderRepeatingFeature
CommitCustomerInfoToRegistry
CommitLonWorksPathToRegistry
ControlLcaServSvc
DeactivateMiniKitRepeatingFeature
DeactivateNodeBuilderRepeatingFeature
EndControlLdvxBrokerSvc
GetOpenLdvInstallStatus
InstallCrypKeyNtDriver
InstallLnsLicUpdate2006SpecOps
InstallPcltaDriver
InstallPyxosUSBDriver
InstallUltaDriver
LaunchFile
ModifyStartupType
OpenPermissionsForFolder
PostInstallSpecialOps
RelocateAlteraExamplePaths
SetINSTALLDIRvarFromLonWorksPath
SetLNSAPPVERSIONvarForLnsUserApps
SetLNSVERSIONvarForLnsRuntimeInstalls
SetOpenLdvInstallStatus
StartControlLdvxBrokerSvc
UninstallPreMsiInstallers
UninstallSpecialOps
WaitIfDriverIsBeingInstalled
Sections
.text Size: 152KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ