C:\3234412\jason1\bordeaux\barron\fsgsemrtddzn.pdb
Static task
static1
Behavioral task
behavioral1
Sample
eb67390a201676631c96346b0dff9df0_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
eb67390a201676631c96346b0dff9df0_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
General
-
Target
eb67390a201676631c96346b0dff9df0_NeikiAnalytics.exe
-
Size
5.7MB
-
MD5
eb67390a201676631c96346b0dff9df0
-
SHA1
74ac70a73259e68a64903c45db5e613d028b652d
-
SHA256
58135ffacc314545719d34f8dd1f4daa9fd516e8acdda0e7dae25bf70bb9b31b
-
SHA512
8a7151d12231228b9c317c72be26bc1faf9fef228d44bd0c746f85f3e5e2251af541c9b2692345e287dc888323be0ff9a91674f4267fd65c61902c3b562077df
-
SSDEEP
98304:hs1G5OG/2Uvh6Y+ykQ8wH8UnlKGRncJkLxZRNyiIx9MEf:rOO2UvIY+DQBHPlwkLxPNleMEf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb67390a201676631c96346b0dff9df0_NeikiAnalytics.exe
Files
-
eb67390a201676631c96346b0dff9df0_NeikiAnalytics.exe.dll windows:5 windows x86 arch:x86
d19addfba2678c7a8e8b7e68f7b7ae2f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
FindFirstFileA
GetLastError
lstrcmpiA
VirtualAlloc
FindClose
OpenMutexA
GetModuleFileNameA
FindNextFileA
lstrcmpiW
VirtualProtect
CloseHandle
lstrcpyA
GetConsoleOutputCP
WriteConsoleW
HeapSize
FlushFileBuffers
HeapReAlloc
GetProcessHeap
SetEndOfFile
GetConsoleMode
GetConsoleCP
lstrlenW
LoadLibraryW
VerifyVersionInfoA
GlobalAlloc
GetUserDefaultLangID
VerSetConditionMask
lstrlenA
lstrcmpA
GetStringTypeW
HeapAlloc
MultiByteToWideChar
ReadFile
WideCharToMultiByte
SetFilePointer
GetCurrentThreadId
DecodePointer
GetCommandLineA
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetProcAddress
SetStdHandle
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
GetFileType
SetHandleCount
GetStdHandle
GetStartupInfoW
DeleteCriticalSection
HeapFree
IsProcessorFeaturePresent
CreateFileA
CreateFileW
ExitProcess
WriteFile
GetModuleFileNameW
HeapCreate
HeapDestroy
LCMapStringW
Sleep
RtlUnwind
SetEnvironmentVariableA
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
CompareStringW
user32
IsCharAlphaA
GetSubMenu
LoadStringA
IsClipboardFormatAvailable
SendMessageA
GetMenu
LoadStringW
CreatePopupMenu
DestroyMenu
FindWindowA
GetClipboardOwner
GetParent
gdi32
Escape
CreateCompatibleDC
advapi32
RegEnumKeyA
ImpersonateNamedPipeClient
RegOpenKeyExA
GetUserNameW
RegCloseKey
shlwapi
PathCombineA
PathRemoveFileSpecA
PathStripPathA
Exports
Exports
MIQMqCqWcOYEKSai
ewaxtqsxfvg
htechjrkwixym
ntnbtetszrfgtla
qnersvtmnbmqjvbr
suvcttpijnrhm
tnfnnvigrtz
zuapfeltvrhvxgl
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 5.6MB - Virtual size: 5.6MB
IMAGE_SCN_MEM_READ