C:\ReleaseAI\win\Release\stubs\x86\aijclw.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d1b9e1eb2bcb7324cca88abd0fe3f7c0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
d1b9e1eb2bcb7324cca88abd0fe3f7c0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
d1b9e1eb2bcb7324cca88abd0fe3f7c0_NeikiAnalytics.exe
-
Size
638KB
-
MD5
d1b9e1eb2bcb7324cca88abd0fe3f7c0
-
SHA1
fc0be6d7a95ec72353836d7ad7ab6e61a69ea0fd
-
SHA256
b22640d07adc6c9ab5d0ae95caaeed2cf9419a88db1131755ea22032603fda97
-
SHA512
da00c9e581e69cd1d607d0629fd67fd3d06d03a3d23cf0f4802d1e1d944d2e9d581d1f3c43939e0fdc78f6c003898edea5ae03357f5e17f7a15cf01f1612d0c2
-
SSDEEP
12288:LVpZtm1e1oZM15Ge/j27N+BhRTB/oGEtc:ppZtz1tDX6B+BhRTKGEtc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d1b9e1eb2bcb7324cca88abd0fe3f7c0_NeikiAnalytics.exe
Files
-
d1b9e1eb2bcb7324cca88abd0fe3f7c0_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
b42b3a96cde9444616227ed5a62f0c81
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msi
ord173
kernel32
GetFileSize
ReadFile
ExpandEnvironmentStringsW
WriteFile
GetEnvironmentVariableW
MultiByteToWideChar
WideCharToMultiByte
MulDiv
GetModuleHandleW
GetCurrentProcess
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
OutputDebugStringW
GetCurrentProcessId
GetCurrentThreadId
GetLocalTime
FlushFileBuffers
GetModuleFileNameW
lstrcmpiW
LoadLibraryExW
InitializeCriticalSectionEx
SetThreadLocale
GetSystemDefaultLCID
DecodePointer
lstrlenW
GetPrivateProfileStringW
GetPrivateProfileSectionNamesW
WritePrivateProfileStringW
GetExitCodeThread
CreateThread
WaitForSingleObject
OpenProcess
GetExitCodeProcess
Sleep
CreateProcessW
GetCommandLineW
AddDllDirectory
CreateEventW
SetEvent
GlobalMemoryStatus
SetEnvironmentVariableW
SetCurrentDirectoryW
GetTimeFormatW
GetDateFormatW
GetUserDefaultLangID
CloseHandle
VerifyVersionInfoW
VerSetConditionMask
CompareStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetACP
IsValidCodePage
FindFirstFileExW
GetFileType
GetStdHandle
GetModuleHandleExW
ExitProcess
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
InitializeCriticalSectionAndSpinCount
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
IsDebuggerPresent
LoadLibraryExA
VirtualQuery
LCMapStringW
VirtualProtect
GetSystemInfo
SetStdHandle
GetStringTypeW
SetFilePointerEx
GetConsoleOutputCP
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
CreateFileW
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
RaiseException
GetConsoleMode
CreateDirectoryW
RemoveDirectoryW
FindNextFileW
DeleteFileW
SetLastError
GetFullPathNameW
FindFirstFileW
GetOEMCP
FindClose
FreeLibrary
GetProcAddress
LoadLibraryW
GetLastError
WriteConsoleW
user32
PtInRect
GetCapture
SetCapture
SetFocus
TrackMouseEvent
SetCursor
DrawFocusRect
GetFocus
GetSysColor
ScreenToClient
SetRectEmpty
GetClassNameW
SystemParametersInfoW
GetWindowTextLengthW
GetWindowTextW
DrawTextW
OffsetRect
IsWindowEnabled
FillRect
MessageBoxW
GetCursorPos
GetDlgCtrlID
ReleaseCapture
EnableWindow
DialogBoxParamW
DispatchMessageW
TranslateMessage
UpdateWindow
GetActiveWindow
GetMessageW
RegisterWindowMessageW
PostThreadMessageW
EndPaint
BeginPaint
LoadCursorW
GetClassInfoExW
RegisterClassExW
CallWindowProcW
GetSystemMetrics
InvalidateRect
RedrawWindow
IsWindowVisible
ShowWindow
EndDialog
CreateWindowExW
IsWindow
SendMessageW
SetWindowLongW
GetWindow
GetWindowLongW
MonitorFromWindow
GetMonitorInfoW
GetWindowRect
GetParent
MapWindowPoints
SetWindowPos
SetWindowTextW
GetDlgItem
UnregisterClassW
DestroyWindow
DefWindowProcW
CharNextW
ReleaseDC
GetClientRect
GetDC
LoadStringW
PeekMessageW
gdi32
SetTextColor
GetStockObject
CreateFontIndirectW
GetObjectW
BitBlt
SelectObject
CreateCompatibleDC
DeleteDC
CreateCompatibleBitmap
DeleteObject
SetBkMode
advapi32
RegSetValueExW
RegCloseKey
RegQueryInfoKeyW
RegDeleteKeyW
RegEnumKeyExW
RegDeleteValueW
RegOpenKeyExW
RegCreateKeyExW
CryptAcquireContextW
CryptDestroyHash
CryptHashData
CryptDestroyKey
CryptDeriveKey
CryptCreateHash
CryptReleaseContext
CryptGetHashParam
CryptDecrypt
RegQueryValueExW
shell32
ShellExecuteW
SHBrowseForFolderW
SHGetPathFromIDListW
ole32
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
oleaut32
VarUI4FromStr
shlwapi
PathIsUNCW
Sections
.text Size: 237KB - Virtual size: 236KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 323KB - Virtual size: 322KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ