sppsvc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e70b32b414b6964962b39c3f7ff65d30_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e70b32b414b6964962b39c3f7ff65d30_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
e70b32b414b6964962b39c3f7ff65d30_NeikiAnalytics.exe
-
Size
3.4MB
-
MD5
e70b32b414b6964962b39c3f7ff65d30
-
SHA1
b2a8ca91d2c12b9f9d273f56e381a8ed2f8f6792
-
SHA256
edb5efee9f33d43523d02ad9c2fc36c9cb9c1ca073286f35d73510a5fb21c238
-
SHA512
0e80de03db20d367da1f5cc2987b1d894cd5681d2018028d54f881f73cdfe9475ac072a2f2f8a4f8196d01fc9af6901e9c80fa3fd579f1ef7508977193661a7a
-
SSDEEP
49152:padpFUx1nkQoqvUbvgXELEnAR0gXV/XB+7bZE1GhnuFnNeNMWo8CWgiV5omI05Ib:iFUxeecao3yadFnN0DHIe2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e70b32b414b6964962b39c3f7ff65d30_NeikiAnalytics.exe
Files
-
e70b32b414b6964962b39c3f7ff65d30_NeikiAnalytics.exe.exe windows:6 windows x64 arch:x64
7bcaa6f7c2a49f73d8165171f14f2bd5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
TraceMessage
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
RegisterTraceGuidsW
UnregisterTraceGuids
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
SetServiceStatus
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
FreeSid
AllocateAndInitializeSid
CheckTokenMembership
ConvertStringSidToSidW
RegSetKeySecurity
RegCreateKeyExW
RegDeleteValueW
RegQueryInfoKeyW
RegEnumKeyW
RegSetValueExW
RegDeleteKeyW
RegisterEventSourceW
ReportEventW
DeregisterEventSource
CryptGenRandom
CryptAcquireContextW
CryptReleaseContext
ConvertSidToStringSidW
OpenProcessToken
EqualSid
GetTokenInformation
RegEnumKeyExW
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptDestroyKey
CryptEncrypt
CryptDecrypt
CryptImportKey
CryptSignHashA
CryptVerifySignatureA
CryptExportKey
CryptGenKey
RegisterTraceGuidsA
LookupAccountNameW
kernel32
CreateEventW
RegisterWaitForSingleObject
CreateTimerQueue
CreateTimerQueueTimer
GetModuleHandleExW
UnregisterWaitEx
DeleteTimerQueue
DecodePointer
DeleteTimerQueueEx
EncodePointer
FileTimeToSystemTime
CreateMutexW
OpenMutexW
ReleaseMutex
GetTickCount
CreateSemaphoreW
GetDateFormatW
GetTimeFormatW
ExpandEnvironmentStringsW
MultiByteToWideChar
CreateFileW
GetFileSize
ReadFile
QueueUserWorkItem
GetCurrentProcessId
OpenProcess
WriteFile
GetFileAttributesW
SetFileAttributesW
ChangeTimerQueueTimer
CreateDirectoryW
GetFileSizeEx
GetSystemInfo
SystemTimeToFileTime
CompareFileTime
GetSystemTimeAsFileTime
lstrlenW
RaiseException
GetModuleHandleA
WaitForMultipleObjects
GetDevicePowerState
CreateSemaphoreA
GetPrivateProfileStringW
GetFullPathNameW
InitializeCriticalSection
GetVersion
VirtualAlloc
SetLastError
VirtualFree
GetLocalTime
DeleteFileW
FlushFileBuffers
CopyFileW
MoveFileExW
SetFilePointer
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetVersionExA
WideCharToMultiByte
GetComputerNameW
DeviceIoControl
LCMapStringW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
GetLocaleInfoW
GetSystemDirectoryW
UnhandledExceptionFilter
TerminateProcess
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetProcAddress
LoadLibraryW
VirtualQuery
FreeLibrary
Sleep
GetVersionExW
WaitForSingleObject
SetEvent
ReleaseSemaphore
HeapSetInformation
LeaveCriticalSection
EnterCriticalSection
DeleteTimerQueueTimer
GetCurrentThreadId
LocalFree
DeleteCriticalSection
SetThreadPriority
GetThreadPriority
GetCurrentProcess
DuplicateHandle
GetCurrentThread
GetLastError
OpenThread
CloseHandle
LocalAlloc
GetProcessHeap
HeapFree
HeapAlloc
VirtualProtect
msvcrt
memmove
swscanf
_wcsicmp
wcschr
sscanf
_wtof
_wtoi
memcmp
_vsnwprintf
_itow
rand
srand
time
_vscwprintf
_beginthreadex
_ui64tow
malloc
free
?terminate@@YAXXZ
memset
memcpy
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_fmode
_commode
__setusermatherr
_amsg_exit
_initterm
exit
_cexit
_exit
_XcptFilter
__C_specific_handler
__wgetmainargs
wcsncmp
_wcsnicmp
_purecall
rpcrt4
NdrServerCall2
RpcServerRegisterIfEx
RpcServerListen
RpcServerInqCallAttributesW
I_RpcBindingInqLocalClientPID
I_RpcMapWin32Status
RpcServerUnregisterIf
RpcMgmtStopServerListening
RpcRaiseException
RpcImpersonateClient
RpcRevertToSelfEx
UuidCreate
UuidFromStringW
RpcStringFreeW
UuidToStringW
RpcServerUseProtseqEpW
ntdll
NtQueryInformationThread
RtlEnterCriticalSection
RtlLeaveCriticalSection
RtlCopyUnicodeString
RtlCompareUnicodeString
RtlInitUnicodeString
RtlAllocateHeap
RtlFreeHeap
RtlDeleteFunctionTable
RtlInstallFunctionTableCallback
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
NtSetInformationThread
ole32
CoUninitialize
CoInitializeEx
CoInitializeSecurity
Exports
Exports
?SPRevision@@3PADA
?SPVersion@@3PADA
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 222KB - Virtual size: 222KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ