ADelRCP_Exec.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b0a9dc64767acc052449dd9e0d1e1e20_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
b0a9dc64767acc052449dd9e0d1e1e20_NeikiAnalytics.exe
-
Size
805KB
-
MD5
b0a9dc64767acc052449dd9e0d1e1e20
-
SHA1
5c3205ce4c4251013f1a4c4e2fe5639059ce6f77
-
SHA256
069fee5292a5eb7fc8d5711f9cfa0286f1658fef0b3a0910d38ed595d5394931
-
SHA512
a70947113d0cadb6539ec54db8e82a38ab8937470ed2a96794851947953913e175ff39acb74302c2bd1b60d658538394ecb330310ee52319f98973fe4670f4a4
-
SSDEEP
12288:WlGp0BiUMAdB8qr0zw9iXQ40AOzDr5YJjsF/5v3ZkHRik8u:WXMatr0zAiX90z/F0jsFB3SQkJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource b0a9dc64767acc052449dd9e0d1e1e20_NeikiAnalytics.exe
Files
-
b0a9dc64767acc052449dd9e0d1e1e20_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
3eaea8b07e41d97c5d0d0bb4ccc2cdae
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msi
ord8
ord17
ord70
ord125
ord205
ord167
ord145
ord74
ord103
api-ms-win-crt-string-l1-1-0
wcsncpy_s
strcat_s
wcsncmp
wcstok
wcslen
_wcslwr_s
strlen
wcscmp
_wcslwr
strcpy_s
wcscat_s
wcscpy_s
_wcsicmp
memset
api-ms-win-crt-convert-l1-1-0
_itow_s
api-ms-win-crt-stdio-l1-1-0
fsetpos
__stdio_common_vswprintf
_get_stream_buffer_pointers
fclose
fflush
fgetc
fgetpos
fputc
ungetc
setvbuf
fread
_fseeki64
fwrite
api-ms-win-crt-runtime-l1-1-0
_initialize_onexit_table
_crt_atexit
_invalid_parameter_noinfo_noreturn
terminate
abort
_errno
_invalid_parameter_noinfo
_wassert
_register_onexit_function
api-ms-win-crt-heap-l1-1-0
free
calloc
_callnewh
malloc
_recalloc
api-ms-win-crt-filesystem-l1-1-0
_lock_file
_unlock_file
_wsplitpath_s
vcruntime140
_setjmp3
wcschr
_except_handler4_common
wcsstr
__CxxFrameHandler3
__std_exception_copy
__std_exception_destroy
memcmp
memcpy
memmove
_CxxThrowException
longjmp
msvcp140
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QBE?AVlocale@2@XZ
?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ
?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ
?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBEPADXZ
?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBEPADXZ
?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBEPADXZ
?egptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBEPADXZ
?gbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXH@Z
?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXPAD00@Z
?epptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBEPADXZ
?_Gndec@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEPADXZ
?_Gninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEPADXZ
?_Gnavail@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBE_JXZ
?pbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXH@Z
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEPADXZ
?_Pnavail@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBE_JXZ
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXXZ
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXPAPAD0PAH001@Z
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPBD_J@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEPAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ
??0?$basic_istream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??1?$basic_istream@DU?$char_traits@D@std@@@std@@UAE@XZ
?_Fiopen@std@@YAPAU_iobuf@@PB_WHH@Z
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JXZ
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
??0_Lockit@std@@QAE@H@Z
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PAD1AAPAD@Z
?out@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PBD1AAPBDPAD3AAPAD@Z
?in@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PBD1AAPBDPAD3AAPAD@Z
?always_noconv@codecvt_base@std@@QBE_NXZ
?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ
??Bid@locale@std@@QAEIXZ
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
??1_Lockit@std@@QAE@XZ
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SAIPAPBVfacet@locale@2@PBV42@@Z
kernel32
TlsSetValue
TlsGetValue
SetLastError
LoadLibraryExW
VirtualQuery
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
ProcessIdToSessionId
TerminateProcess
GetCurrentProcessId
GetFullPathNameW
SystemTimeToFileTime
GetModuleHandleW
GetWindowsDirectoryW
OpenProcess
GetCurrentProcess
DeleteCriticalSection
InitializeCriticalSectionEx
GetProcessHeap
HeapFree
HeapAlloc
RaiseException
CloseHandle
CreateFileW
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
lstrcatW
lstrcpyW
lstrcmpiW
lstrcmpW
FormatMessageW
LocalFree
LoadLibraryW
GetProcAddress
GetModuleFileNameW
FreeLibrary
GetSystemDirectoryW
GetSystemTime
CreateProcessW
OutputDebugStringW
Sleep
GetLastError
advapi32
ConvertSidToStringSidW
RegEnumKeyExW
RegDeleteKeyExW
CreateProcessWithTokenW
EqualSid
DuplicateTokenEx
AllocateAndInitializeSid
CreateProcessAsUserW
SetNamedSecurityInfoW
GetNamedSecurityInfoW
RegOpenKeyExW
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextW
RegDeleteKeyW
RegCreateKeyExW
GetTokenInformation
OpenProcessToken
RegSetValueExW
RegQueryValueExW
RegQueryInfoKeyW
RegCloseKey
shell32
SHGetSpecialFolderPathW
SHChangeNotify
SHGetKnownFolderPath
ole32
CoTaskMemFree
CLSIDFromString
CoCreateInstance
CoInitializeEx
Sections
.text Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 153KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 572KB - Virtual size: 576KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE