muirct.pdb
Static task
static1
General
-
Target
89c8507f20487e01c8004160e707d7f0_NeikiAnalytics.exe
-
Size
720KB
-
MD5
89c8507f20487e01c8004160e707d7f0
-
SHA1
2c63aa0385b668e17bb6916828e5aa5b9b8da0af
-
SHA256
7453972f3aa935c597d8c54330c203e028555a88321e1644f8e3bf85d5309f8a
-
SHA512
2e7ac3688c5ac7c898f58b29fc94c0e77fdaceb4c02d953b6be095e6c9174f6a69bb785b736df02e2c65f34cbaa2f5a67ae1c7b2166c494c781444d4354e20a8
-
SSDEEP
12288:P7hU1vpJJdp/SInr8vv2BDeT+bVYHTb3FRk/rMNxaXqqlPbJKTGv5DYFXOBnXRE6:VU1VL/i328ab4F+rM/aXq6bJfBUam6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 89c8507f20487e01c8004160e707d7f0_NeikiAnalytics.exe
Files
-
89c8507f20487e01c8004160e707d7f0_NeikiAnalytics.exe.exe windows:10 windows x64 arch:x64
3064221fc9208288e0016821c0f93774
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
IsTextUnicode
kernel32
CreateDirectoryW
SizeofResource
LocalAlloc
GetFileAttributesW
SetFileAttributesW
GetLastError
LockResource
DeleteFileW
HeapSetInformation
LoadResource
LocalFree
FreeLibrary
CopyFileW
LoadLibraryExW
HeapCreate
HeapFree
HeapAlloc
HeapDestroy
GetProcessHeap
FormatMessageW
GetFullPathNameW
EnumResourceTypesW
WriteFile
EnumResourceNamesW
CreateFileW
GetVersionExW
UnmapViewOfFile
CloseHandle
EnumResourceLanguagesW
LoadLibraryW
FindResourceExW
UpdateResourceW
GetProcAddress
GetModuleHandleW
BeginUpdateResourceW
CreateFileMappingW
MapViewOfFile
ReadFile
GetFileSizeEx
MultiByteToWideChar
Sleep
VirtualProtect
GetTempFileNameW
_lread
MoveFileExW
GlobalLock
GlobalFree
_llseek
GetTempPathW
SetLastError
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
OutputDebugStringA
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GlobalUnlock
_lwrite
_lclose
msvcrt
_exit
_cexit
__setusermatherr
_initterm
_errno
_fmode
_commode
?terminate@@YAXXZ
_lock
_unlock
__dllonexit
_onexit
memcpy
memset
__wgetmainargs
memcmp
exit
_amsg_exit
_XcptFilter
_CxxThrowException
__set_app_type
_callnewh
?what@exception@@UEBAPEBDXZ
??1exception@@UEAA@XZ
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@AEBQEBDH@Z
__CxxFrameHandler
??1type_info@@UEAA@XZ
bsearch
wcsncpy
__iob_func
wcsncmp
towupper
_wcsnicmp
wcsstr
strncmp
strtoul
wcschr
toupper
towlower
_vsnwprintf
malloc
free
fwprintf
vfwprintf
wcsrchr
_purecall
wcstoul
_wcsicmp
__C_specific_handler
wcscmp
imagehlp
MapFileAndCheckSumW
bcrypt
BCryptHashData
BCryptOpenAlgorithmProvider
BCryptGetProperty
BCryptCloseAlgorithmProvider
BCryptFinishHash
BCryptDestroyHash
BCryptCreateHash
user32
CharLowerW
ntdll
RtlLookupFunctionEntry
RtlAllocateHeap
RtlFreeHeap
RtlCaptureContext
RtlVirtualUnwind
Sections
.text Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE