C:\BuildAgent\work\4a73c29f3c4e6ac\downloader\Release\downloader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4649a3b1bf752175e43b64c7b80504d0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4649a3b1bf752175e43b64c7b80504d0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
4649a3b1bf752175e43b64c7b80504d0_NeikiAnalytics.exe
-
Size
354KB
-
MD5
4649a3b1bf752175e43b64c7b80504d0
-
SHA1
e895aa2a453a5689add82e13ce6fdb0fbc29097e
-
SHA256
43447c2be333eb30ca14a179ab8db6a322446ae7d8c56bc22601aed507804fba
-
SHA512
c7f43be2f2a305dc1de10c018b2c43a02499660d3c70fcdfce33270ed8a9974bb90bf18809bfabb66f3b12333f53b2e88b8f2ad997f62aeec79603128ce83107
-
SSDEEP
6144:0fp18znPaTavhPvnenut3drPAFl3oAOYk22zVstTtsOkz:0fp18wihPvncK3iYmkXqhsO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4649a3b1bf752175e43b64c7b80504d0_NeikiAnalytics.exe
Files
-
4649a3b1bf752175e43b64c7b80504d0_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
8671a3d963861aab61fe1391c7d8536a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationW
secur32
LsaFreeReturnBuffer
LsaEnumerateLogonSessions
LsaGetLogonSessionData
wininet
InternetSetOptionA
InternetCloseHandle
InternetSetStatusCallbackA
InternetOpenA
InternetOpenUrlA
kernel32
ReadConsoleW
WriteConsoleW
SetStdHandle
SetHandleInformation
GetCommandLineW
GetCurrentProcess
InterlockedDecrement
GetModuleFileNameW
GetTempPathW
WaitForSingleObject
GetVersionExW
Sleep
GetLastError
GetVersionExA
CloseHandle
GetCurrentProcessId
CreateProcessW
GetExitCodeProcess
HeapSize
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
VirtualQuery
HeapFree
FindClose
DuplicateHandle
MultiByteToWideChar
OutputDebugStringW
HeapAlloc
GetProcessHeap
WideCharToMultiByte
ReadFile
EnumSystemLocalesW
GetUserDefaultLCID
SetEndOfFile
GetModuleHandleExW
SetFilePointerEx
GetStdHandle
CreateFileW
FindFirstFileExW
IsValidLocale
GetConsoleMode
GetConsoleCP
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
ExitProcess
HeapReAlloc
LoadLibraryExW
FreeLibrary
RaiseException
RtlUnwind
GetOEMCP
IsValidCodePage
FindNextFileW
FlushFileBuffers
GetFileType
GetACP
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
GetStringTypeW
LocalFree
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
InitializeSListHead
WriteFile
user32
wsprintfW
CharLowerW
advapi32
CopySid
ConvertSidToStringSidW
GetLengthSid
LsaNtStatusToWinError
OpenProcessToken
GetTokenInformation
shell32
SHCreateDirectoryExW
ShellExecuteExW
ole32
CoUninitialize
CoCreateInstance
OleRun
CoCreateGuid
StringFromGUID2
CoInitialize
oleaut32
VariantInit
SysFreeString
SysAllocString
VariantClear
GetErrorInfo
urlmon
URLOpenBlockingStreamW
wintrust
WinVerifyTrust
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
Sections
.text Size: 218KB - Virtual size: 218KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 652B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ