c:\source\source.ACL\86254\Release_wdexe_12\WX\Win32\Release\WDExe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
480d9b050b7a6eeec5d0b27dd94e4a70_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
480d9b050b7a6eeec5d0b27dd94e4a70_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
480d9b050b7a6eeec5d0b27dd94e4a70_NeikiAnalytics.exe
-
Size
3.0MB
-
MD5
480d9b050b7a6eeec5d0b27dd94e4a70
-
SHA1
ac37975f03f08382f28ab87d0267b4e40fe1f8d3
-
SHA256
0e76c14659e6db6406c297706c0764b88c9af9f840fa8826fc4e6bda9d5dc72a
-
SHA512
42d53715684e388d7fda7d93ae8bebfcb072169758955ce0411d2f74ee16105e3c757ffa73c830553d0caf38f1bebf4d518e081abc520910260ee18dc3d5a8ba
-
SSDEEP
49152:8p+jJK65qW+4gHPLoQNg4OB+czU8laBejbQMSfd43FLoEDOQ4s4OW:hK6QW3mNNC+cY84gjbvSl41rP4s4B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 480d9b050b7a6eeec5d0b27dd94e4a70_NeikiAnalytics.exe
Files
-
480d9b050b7a6eeec5d0b27dd94e4a70_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
3d8f2f97d54fbb902659375438231cd3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
exit
_XcptFilter
_exit
_except_handler3
_onexit
__dllonexit
_lfind
vsprintf
vswprintf
iswspace
_stricmp
memcmp
realloc
towupper
wcspbrk
_wmakepath
_wstati64
memmove
wcscmp
wcsncmp
atoi
_wcsnicmp
swprintf
_wtoi
wcsstr
_wcsupr
strchr
strlen
strcat
wcschr
_vsnprintf
_vsnwprintf
_purecall
strncmp
_wcsicmp
memcpy
gmtime
time
free
malloc
memset
??2@YAPAXI@Z
wcscpy
??3@YAXPAX@Z
wcsrchr
wcslen
wcsncpy
wcscat
__CxxFrameHandler
kernel32
WaitForSingleObject
RaiseException
CreateProcessW
CreateMailslotW
ExpandEnvironmentStringsW
GetComputerNameW
GetMailslotInfo
GetSystemDefaultLangID
GetExitCodeProcess
GetProfileStringW
CreateThread
TerminateThread
ResumeThread
InterlockedExchange
ReleaseSemaphore
CreateSemaphoreW
LoadLibraryA
GetTimeZoneInformation
WideCharToMultiByte
WritePrivateProfileStringW
GetPrivateProfileIntW
GetPrivateProfileStringW
GetCurrentThreadId
TlsFree
TlsAlloc
VirtualProtect
VirtualQuery
TlsGetValue
TlsSetValue
GetDriveTypeW
GetFullPathNameW
FindNextFileW
FindFirstFileExW
SetFileAttributesW
GetFileAttributesW
FindClose
FindFirstFileW
CreateDirectoryW
CopyFileW
MoveFileW
DeleteFileW
Sleep
GetTickCount
CreateFileW
FileTimeToSystemTime
SystemTimeToFileTime
SetLastError
SetErrorMode
SetEndOfFile
FlushFileBuffers
UnlockFileEx
UnlockFile
LockFileEx
LockFile
SetFilePointer
ReadFile
WriteFile
GetVolumeInformationW
GetLogicalDriveStringsW
GetFileInformationByHandle
LoadLibraryW
GetVersionExW
LocalAlloc
InterlockedExchangeAdd
GetLocalTime
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
ExitProcess
GetCommandLineW
LocalFree
GetModuleFileNameW
GetLastError
CreateFileMappingW
CloseHandle
MapViewOfFile
UnmapViewOfFile
GetVersionExA
GetModuleHandleW
GetProcAddress
MultiByteToWideChar
CreateEventW
GetStartupInfoW
MulDiv
SetEvent
CreateMutexW
ReleaseMutex
OpenFileMappingW
FreeLibrary
FindResourceW
LoadResource
LockResource
FreeResource
GetTempPathW
GetTempFileNameW
GetCurrentProcessId
SizeofResource
InterlockedIncrement
InterlockedDecrement
FormatMessageW
Exports
Exports
CommandeComposante
DeclareProxy
Execution
LibereMutex
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ