D:\a\_work\1\s\\binaries\x86ret\bin\i386\pgocvt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6a4e946ef6fe8d1bba681cb4f76c6470_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6a4e946ef6fe8d1bba681cb4f76c6470_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
6a4e946ef6fe8d1bba681cb4f76c6470_NeikiAnalytics.exe
-
Size
609KB
-
MD5
6a4e946ef6fe8d1bba681cb4f76c6470
-
SHA1
8f36c9f15e7d1eb12e1a99b4df7a4714c7fe0138
-
SHA256
266ca822e19aa5414d02cb6491c853ddd5c8d9899ac5d5baec587ffe15eebda0
-
SHA512
7c618cc337546e5c45bc738fc35a339d0a16a6aec113069156b95d9198d42d4005b5ddd982c0a8c8bf54c7fc70815d4ef21fee269352a7aab279c8252de6d501
-
SSDEEP
12288:u3T1uJGt/sB1KcYmqgZvAMlUoUjG+YKtMfnkOeZb5JYiNAgAPhJ:cT1ust/sBlDqgZQd6XKtiMJYiPUJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 6a4e946ef6fe8d1bba681cb4f76c6470_NeikiAnalytics.exe
Files
-
6a4e946ef6fe8d1bba681cb4f76c6470_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
9c7a17396b0c3dd7e5986d0875c7edc2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
vcruntime140
_CxxThrowException
__std_exception_copy
__std_exception_destroy
_except_handler4_common
wcschr
__CxxFrameHandler3
__current_exception_context
__current_exception
wcsrchr
memset
memcpy
api-ms-win-crt-runtime-l1-1-0
_errno
_register_thread_local_exe_atexit_callback
_c_exit
_cexit
__p___wargv
__p___argc
terminate
_exit
_initterm_e
_initterm
_get_initial_wide_environment
_initialize_wide_environment
_configure_wide_argv
_initialize_onexit_table
_set_app_type
_seh_filter_exe
_register_onexit_function
exit
__p__wpgmptr
_controlfp_s
_crt_atexit
api-ms-win-crt-stdio-l1-1-0
_fileno
_get_osfhandle
fclose
_wfsopen
putchar
fputs
fwrite
ftell
__stdio_common_vswscanf
_set_fmode
__acrt_iob_func
fflush
__p__commode
fseek
_chsize_s
__stdio_common_vsnwprintf_s
__stdio_common_vswprintf_s
api-ms-win-crt-time-l1-1-0
_tzset
_time64
api-ms-win-crt-heap-l1-1-0
_set_new_mode
calloc
malloc
free
_callnewh
api-ms-win-crt-string-l1-1-0
wcstok_s
_wcsicmp
wcsncpy_s
wcscpy_s
wcsncat_s
_wcsdup
api-ms-win-crt-filesystem-l1-1-0
_wmakepath_s
_wsplitpath_s
api-ms-win-crt-environment-l1-1-0
_wgetcwd
_wdupenv_s
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
pgodb140
?GetMachineId@PogoDbUtil@@SGKPBG@Z
?GetMachineName@PogoDbUtil@@SGPBGK@Z
?GetMachineAttributes@PogoDbUtil@@SGPAUtagPGDMACHINEATTR@@K@Z
?GetErrorText@PogoDbUtil@@SGPBGW4POGODB_ERROR@@@Z
?SzUtf8DupWz@PogoDbUtil@@SGPADPBG@Z
?NewPgdObject@PogoDbUtil@@SGPAVPogoDbInterface@@XZ
?DeletePgdObject@PogoDbUtil@@SGPAVPogoDbInterface@@PAV2@@Z
?FreeMemory@PogoDbUtil@@SGXPAX@Z
kernel32
IsDebuggerPresent
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
FormatMessageW
LocalFree
GetConsoleMode
GetConsoleOutputCP
GetCPInfo
WideCharToMultiByte
WriteFile
GetFileType
GetUserDefaultUILanguage
LoadResource
LoadLibraryExW
GetProcAddress
GetModuleFileNameW
FindResourceExW
GetProcessHeap
HeapFree
HeapAlloc
DecodePointer
EncodePointer
FindNextFileW
FindFirstFileW
FindClose
SetLastError
GetLastError
GetEnvironmentVariableW
QueryPerformanceCounter
api-ms-win-crt-convert-l1-1-0
_itow_s
wcstol
_wtoi
wcstoul
api-ms-win-crt-conio-l1-1-0
_cputws
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE