D:\dbs\sh\ddvsm\0128_230433\cmd\25\out\binaries\x86ret\bin\i386\StorePID.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6842a651c461946996b4be3de57b8b30_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6842a651c461946996b4be3de57b8b30_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
6842a651c461946996b4be3de57b8b30_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
6842a651c461946996b4be3de57b8b30
-
SHA1
c662c566147570a5fc4f4b7a383195fdcfe13cf9
-
SHA256
ec0f2489879b7d309827a073e69f8e46893f575913a93f42585e92f936e36dde
-
SHA512
956a1b2ac74cb6565ad36390ef79ba79723d08f953a3af7055ca273da181e5a2bfc2c82535d3e6034d7364ce86c0e61174c6a6d9719bad86374124da560dcec1
-
SSDEEP
12288:XcujMTmkJR4Do07Y86gw5CtCjX+NLuFhNpBeZT3X:uSkQ/7Gb8NLEbeZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 6842a651c461946996b4be3de57b8b30_NeikiAnalytics.exe
Files
-
6842a651c461946996b4be3de57b8b30_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
0d32cf3c7bff0832755995662ddb971f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InitializeCriticalSectionEx
GetLastError
DeleteCriticalSection
FindResourceW
OpenEventW
CloseHandle
CreateFileW
MultiByteToWideChar
LoadLibraryW
GetProcAddress
GetModuleFileNameW
FreeLibrary
LocalFree
FindResourceExW
LeaveCriticalSection
EnterCriticalSection
OutputDebugStringW
TerminateProcess
GetCurrentProcess
GetModuleHandleW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
LoadResource
LockResource
SizeofResource
RaiseException
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetSystemTime
HeapDestroy
vcruntime140
_except_handler4_common
memset
__std_exception_destroy
__std_exception_copy
__current_exception_context
memcpy
__CxxFrameHandler3
__current_exception
_CxxThrowException
memmove
api-ms-win-crt-convert-l1-1-0
_wtoi
api-ms-win-crt-string-l1-1-0
wmemcpy_s
wcsnlen
_wcsicmp
wcsncpy_s
api-ms-win-crt-runtime-l1-1-0
__p___argc
__p___wargv
_exit
exit
_initterm_e
_initterm
_cexit
_initialize_wide_environment
_configure_wide_argv
_c_exit
_set_app_type
_seh_filter_exe
_errno
_invalid_parameter_noinfo
_register_thread_local_exe_atexit_callback
_initialize_onexit_table
_register_onexit_function
_crt_atexit
_controlfp_s
terminate
_get_initial_wide_environment
api-ms-win-crt-heap-l1-1-0
_callnewh
_set_new_mode
malloc
free
api-ms-win-crt-math-l1-1-0
__setusermatherr
floor
ceil
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
__stdio_common_vswprintf_s
__stdio_common_vswprintf
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
ole32
IIDFromString
oleaut32
SystemTimeToVariantTime
VariantTimeToSystemTime
crypt32
CryptUnprotectData
CryptProtectData
shlwapi
PathRemoveFileSpecW
PathAppendW
advapi32
AllocateAndInitializeSid
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
FreeSid
CheckTokenMembership
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 992B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE