betest.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5040829cec48665a5d6a811bf24ad3e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
5040829cec48665a5d6a811bf24ad3e0_NeikiAnalytics.exe
-
Size
866KB
-
MD5
5040829cec48665a5d6a811bf24ad3e0
-
SHA1
2af3bfa88aac9f5bd2c761357ed0d9c578bdea5c
-
SHA256
d6c7e097dd82190afc2958a1a319fd7d880686023c58a9c03f5f39baf34c6a28
-
SHA512
2ac5d97409845758e8ddee79014c9493ace11c9f03664897a6cb0fc439e1785926d8b3613d494a62e2d6f7488fcc99e9abaa14a14d48aee889371db1db294684
-
SSDEEP
24576:f0IABufexm9gb408NdHqhxNoiAwc9GB+OEQ19yZGQpR0:xpmqniRAxGB+a19yUy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 5040829cec48665a5d6a811bf24ad3e0_NeikiAnalytics.exe
Files
-
5040829cec48665a5d6a811bf24ad3e0_NeikiAnalytics.exe.exe windows:10 windows x64 arch:x64
49274e2ffecc277b0e990d7c1e7ce73f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
OpenProcessToken
AdjustTokenPrivileges
GetTokenInformation
LookupPrivilegeValueW
CloseServiceHandle
ControlService
OpenSCManagerW
OpenServiceW
QueryServiceStatus
StartServiceW
ConvertSidToStringSidW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegQueryInfoKeyW
RegEnumValueW
DeregisterEventSource
TraceEvent
GetTraceLoggerHandle
GetTraceEnableFlags
GetTraceEnableLevel
RegisterTraceGuidsW
UnregisterTraceGuids
RegisterEventSourceW
ReportEventW
OpenThreadToken
kernel32
GetTempFileNameW
SetEndOfFile
SetFilePointer
RaiseException
GetFileSizeEx
CopyFileW
MoveFileExW
OutputDebugStringW
CreateDirectoryW
GetFileTime
GetFileAttributesW
lstrcmpiW
FindNextFileW
GetCurrentProcess
SetLastError
WriteFile
ReadFile
GetFileSize
CreateFileW
LocalFree
AcquireSRWLockShared
ReleaseSRWLockShared
AcquireSRWLockExclusive
FindFirstFileW
InitializeSRWLock
LoadLibraryExW
FreeLibrary
GetCurrentThread
FormatMessageW
GetCommandLineW
GetSystemTime
TlsFree
TlsGetValue
GetProcAddress
TlsAlloc
TlsSetValue
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
OutputDebugStringA
LocalAlloc
Sleep
GetVolumePathNameW
GetFullPathNameW
ExpandEnvironmentStringsW
GetVersionExW
HeapSetInformation
GetLastError
CloseHandle
GetVolumeNameForVolumeMountPointW
FindClose
CompareFileTime
ReleaseSRWLockExclusive
MultiByteToWideChar
msvcrt
swprintf
??1exception@@UEAA@XZ
?what@exception@@UEBAPEBDXZ
_CxxThrowException
_purecall
memcpy_s
memmove_s
_wcsicmp
wprintf
??0exception@@QEAA@XZ
??0exception@@QEAA@AEBQEBD@Z
??0exception@@QEAA@AEBV0@@Z
__CxxFrameHandler3
??1type_info@@UEAA@XZ
_onexit
__dllonexit
_unlock
_lock
?terminate@@YAXXZ
_commode
_fmode
__C_specific_handler
_initterm
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
_amsg_exit
_XcptFilter
??0exception@@QEAA@AEBQEBDH@Z
_callnewh
wcstoul
iswalpha
mbstowcs
_wcsdup
_vsnwprintf
time
clock
getchar
malloc
realloc
free
wcsrchr
wcscmp
memset
memcpy
printf
_wcsnicmp
wcsstr
wcschr
towlower
_vsnprintf
atl
ord30
user32
wsprintfW
LoadStringW
CharUpperW
ole32
CoTaskMemRealloc
CoUninitialize
CoCreateInstance
CLSIDFromString
CoInitializeEx
CoFileTimeNow
StringFromCLSID
CoTaskMemAlloc
CoTaskMemFree
CoInitializeSecurity
oleaut32
SysAllocStringLen
SysFreeString
VariantClear
SysStringLen
GetErrorInfo
SysAllocString
ntdll
RtlLookupFunctionEntry
RtlCaptureContext
RtlVirtualUnwind
rpcrt4
UuidFromStringW
UuidToStringW
RpcStringFreeW
vssapi
GetProviderMgmtInterfaceInternal
CreateWriter
CreateVssExamineWriterMetadataInternal
CreateVssBackupComponentsInternal
resutils
ClusterIsPathOnSharedVolume
ClusterGetVolumePathName
ClusterGetVolumeNameForVolumeMountPoint
ClusterPrepareSharedVolumeForBackup
api-ms-win-security-lsalookup-l1-1-0
LookupAccountSidLocalW
Sections
.text Size: 183KB - Virtual size: 182KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE