ctrpp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d20ae5ffcde26436cb53b3ac0b5c7490_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
d20ae5ffcde26436cb53b3ac0b5c7490_NeikiAnalytics.exe
-
Size
1.4MB
-
MD5
d20ae5ffcde26436cb53b3ac0b5c7490
-
SHA1
59f903843bd3ad2e95094cac859711dccf910261
-
SHA256
61ce0c976331f1985a3d71f15ccdc73f521a888f7c134f3f04a7d7a17170f280
-
SHA512
588fc4a43d93e2400ae47dabb63d5d4b3764eea0ad913a9a79a40f1b9cf30f449c5658440bedd81df551fd7c006546a81030867da04170c3727e3456e4fdb0e2
-
SSDEEP
12288:GWMawKrNy7op4R+Xq1gYgR+8DAoczI2ZfnwlQTePINayz+ByIne7xmmZjIUTSl++:o9yMdIuwe3zfIe7xmvH/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d20ae5ffcde26436cb53b3ac0b5c7490_NeikiAnalytics.exe
Files
-
d20ae5ffcde26436cb53b3ac0b5c7490_NeikiAnalytics.exe.exe windows:10 windows x64 arch:x64
4a5023f965ce7575753f80a44e96fad5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
LocalFree
CreateEventW
InitializeCriticalSection
LoadResource
FindResourceExW
LockResource
FreeResource
EnterCriticalSection
LeaveCriticalSection
GetFileType
WriteConsoleW
WriteFile
GetStdHandle
GetFileSize
HeapReAlloc
SetLastError
ReadFile
MapViewOfFile
CreateFileMappingW
CloseHandle
MultiByteToWideChar
SetFileAttributesW
UnmapViewOfFile
GetFileAttributesW
GetLastError
SetEndOfFile
SetFilePointer
GetProcAddress
WideCharToMultiByte
FreeLibrary
LoadLibraryExW
GetModuleHandleW
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
FormatMessageW
FindClose
FindNextFileW
FindFirstFileExW
GetProcessHeap
HeapAlloc
HeapSetInformation
CompareStringOrdinal
HeapFree
CreateFileW
DeleteFileW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SizeofResource
api-ms-win-crt-runtime-l1-1-0
_initterm_e
_c_exit
_initterm
_register_thread_local_exe_atexit_callback
api-ms-win-crt-private-l1-1-0
_o__callnewh
_o__cexit
_o__configthreadlocale
_o__configure_wide_argv
_o__crt_atexit
_o__errno
_o__exit
_o__get_initial_wide_environment
_o__initialize_onexit_table
_o__initialize_wide_environment
_o__invalid_parameter_noinfo
_o__invalid_parameter_noinfo_noreturn
_o__register_onexit_function
_o__seh_filter_exe
_o__set_app_type
_o__set_fmode
_o__set_new_mode
_o__wcslwr_s
_o__wcsnicmp
_o__wfopen
_o__wmakepath_s
_o__wsplitpath_s
_o__wtof
_o_calloc
_o_exit
_o_fclose
_o_fgetws
_o_floor
_o_free
_o_iswdigit
_o_malloc
_o_terminate
_o_wcscpy_s
_o_wcstol
_o_wcstoul
_CxxThrowException
_o___stdio_common_vswprintf
_o___stdio_common_vsprintf
_o___stdio_common_vfwprintf
_o___stdio_common_vfprintf
_o___std_exception_destroy
_o___std_exception_copy
_o___p__commode
_o___p___wargv
_o___p___argc
_o___acrt_iob_func
wcsstr
__C_specific_handler
__CxxFrameHandler3
memcpy
memmove
api-ms-win-crt-string-l1-1-0
wcscmp
memset
wcsncmp
ntdll
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlCaptureContext
oleaut32
SysAllocStringByteLen
VariantClear
SysFreeString
SysAllocString
SysStringByteLen
VariantChangeType
VariantInit
VariantCopy
SysStringLen
SysAllocStringLen
advapi32
IsTextUnicode
TraceMessage
user32
LoadStringW
ole32
CoCreateInstance
CoInitializeEx
CoUninitialize
IIDFromString
StringFromGUID2
Sections
.text Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE