t:\onenote\x86\ship\0\onenotem.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8c9712e48dee7c5b5c209739e073e810_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8c9712e48dee7c5b5c209739e073e810_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
8c9712e48dee7c5b5c209739e073e810_NeikiAnalytics.exe
-
Size
1.3MB
-
MD5
8c9712e48dee7c5b5c209739e073e810
-
SHA1
de10ae05565b5a6eaee474224da18fd0b8ebfe80
-
SHA256
88e8a6373f031acf16faaf293a072405eebf4e5db63d8c871854ac881f41b93b
-
SHA512
bdb77e3c23db68469b3d9810908291fca359553272544d157cd33891e5205e90e9d1b166bcd092793f50ec61408fb85147d303b17a5a9908278e756def7d67f7
-
SSDEEP
24576:TgRVldlnXfH9gPwCn7vOb7HHcp/CGXQp:8RVlbnXf9gPTTW7H1GXC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c9712e48dee7c5b5c209739e073e810_NeikiAnalytics.exe
Files
-
8c9712e48dee7c5b5c209739e073e810_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
aedb9851f0d6a766e18e5c076b04b852
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetProcessWorkingSetSize
GetCurrentProcess
HeapCompact
GetProcessHeap
CloseHandle
CreateProcessW
FreeLibrary
GetProcAddress
LoadLibraryW
GetLastError
CreateFileMappingW
GlobalLock
GlobalUnlock
GlobalFree
GlobalAlloc
GetModuleHandleW
GetVersionExW
Sleep
GetCommandLineW
GetCurrentThreadId
ReleaseMutex
UnmapViewOfFile
MapViewOfFile
WaitForSingleObject
CreateMutexW
ResumeThread
CreateThread
CompareStringW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
CreateProcessA
LoadLibraryA
LocalAlloc
RaiseException
FoldStringW
GetLocaleInfoW
GetStringTypeW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
HeapAlloc
HeapFree
GetTempPathA
GetTempFileNameA
VirtualProtect
user32
PostMessageA
PostThreadMessageA
IsWindow
CreatePopupMenu
AppendMenuW
EnableMenuItem
SetMenuDefaultItem
CheckMenuItem
GetCursorPos
TrackPopupMenu
DestroyMenu
SendMessageW
RedrawWindow
EnumDisplayMonitors
FillRect
SetForegroundWindow
SetFocus
SetCapture
SetRectEmpty
DefWindowProcW
LoadCursorW
SetCursor
RegisterWindowMessageW
LoadIconW
RegisterClassExW
CreateWindowExW
GetDC
OpenClipboard
EmptyClipboard
RegisterClipboardFormatW
SetClipboardData
CloseClipboard
ReleaseDC
ShowWindow
WindowFromPoint
IsChild
LoadImageW
RegisterHotKey
GetMessageW
DispatchMessageW
TranslateMessage
UnregisterHotKey
InvalidateRect
SetRect
DestroyWindow
PostQuitMessage
IsRectEmpty
GetSysColorBrush
FrameRect
InflateRect
BeginPaint
EndPaint
UnionRect
LoadStringW
MessageBoxW
PostMessageW
SystemParametersInfoW
msvcr80
memmove
memcpy
_controlfp_s
_invoke_watson
_except_handler4_common
_crt_debugger_hook
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
__set_app_type
memset
__CxxFrameHandler3
wcscat_s
wcscpy_s
_CxxThrowException
wcsrchr
vswprintf_s
vsprintf_s
fclose
fwprintf_s
fopen_s
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
?_type_info_dtor_internal_method@type_info@@QAEXXZ
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE