d:\CC.Net-TempBuilds\MEDAQLib-trunk-nightly-build\Driver\MEDAQLib\Samples\SensorTest\Debug\SensorTest.pdb
Static task
static1
Behavioral task
behavioral1
Sample
16f429fb6b9f3e3ca79594b984d7c290_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
16f429fb6b9f3e3ca79594b984d7c290_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
16f429fb6b9f3e3ca79594b984d7c290_NeikiAnalytics.exe
-
Size
527KB
-
MD5
16f429fb6b9f3e3ca79594b984d7c290
-
SHA1
3671db5d950d6e25b04718ae0106f22f5d338713
-
SHA256
95936d69e24b5a02839966aeea1028943e1b103323799524f5bb23ba257638f2
-
SHA512
83fc9d424dfc6770990b3b3c08eb37d3590c47a637abeea868a686a78fff93752ef5f19f14046eb6044148d3b3c20cb25012aaa532272a86fdeaaadb66a9aa4d
-
SSDEEP
6144:6k84Pt8e2pQIaWnx8K7NeCy18Z8nZ7TXoNYjbcvUIswwiV1tjhywu4nqU8lqKH:S2t8e1Wn6ayKZ8n5oNYwXxh44n58
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 16f429fb6b9f3e3ca79594b984d7c290_NeikiAnalytics.exe
Files
-
16f429fb6b9f3e3ca79594b984d7c290_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
12d7b97463da15e3ce0e9d535f405c19
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Sleep
CompareStringW
CompareStringA
GetTimeZoneInformation
GetLocaleInfoW
SetEndOfFile
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoA
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
InterlockedExchange
SetFilePointer
ReadFile
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
PeekConsoleInputA
GetNumberOfConsoleInputEvents
GetCommandLineA
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
RaiseException
DebugBreak
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
GetProcAddress
LoadLibraryA
GetModuleHandleA
DeleteCriticalSection
FatalAppExitA
CreateFileA
CloseHandle
HeapValidate
IsBadReadPtr
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
RtlUnwind
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleHandleW
InterlockedIncrement
InterlockedDecrement
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThread
HeapDestroy
HeapCreate
HeapFree
VirtualFree
WriteFile
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
SetConsoleCtrlHandler
LoadLibraryW
HeapAlloc
GetProcessHeap
VirtualQuery
FreeLibrary
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
HeapSize
HeapReAlloc
VirtualAlloc
SetStdHandle
FlushFileBuffers
GetConsoleCP
SetEnvironmentVariableA
medaqlib
CreateSensorInstByName
DataAvail
TransferData
ExecSCmdGetInt
GetParameterDouble
ClearAllParameters
SensorCommand
OpenSensor
ExecSCmd
ExecSCmdGetDouble
SetIntExecSCmd
SetParameters
GetError
GetParameterInt
GetParameterString
CloseSensor
ReleaseSensorInstance
Sections
.textbss Size: - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 431KB - Virtual size: 430KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ