autochk.pdb
Static task
static1
General
-
Target
578ec3ac6a6187b9fd14e727fb464360_NeikiAnalytics.exe
-
Size
640KB
-
MD5
578ec3ac6a6187b9fd14e727fb464360
-
SHA1
0269807123136e55a7d008cdeab96be21859512b
-
SHA256
90ffcf83a703b8bc4d3d377029f202ef7ef4b901cbe43c4a3773f5488fb60ff8
-
SHA512
c5286cae7ff9edbec2061d79d0a35aa025b240d5ed963facc73a884d6b4e676fa9d8bf8488589d76ae3ed95528032ca6a6819717bb7248878eb367f0a6114f68
-
SSDEEP
12288:NhI9uTpaJSzmguUYuo2LUmoTX/FSDyttjq:HfdlimYub47sDyttjq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 578ec3ac6a6187b9fd14e727fb464360_NeikiAnalytics.exe
Files
-
578ec3ac6a6187b9fd14e727fb464360_NeikiAnalytics.exe.sys windows:5 windows x86 arch:x86
86dc0edc2316855910bb10af3d8fe8da
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntdll
wcslen
_wcsicmp
wcsstr
NtClose
NtQueryValueKey
NtOpenKey
RtlInitUnicodeString
NtQuerySymbolicLinkObject
NtOpenSymbolicLinkObject
RtlPrefixUnicodeString
RtlEqualUnicodeString
NtQueryDirectoryObject
NtOpenDirectoryObject
NtTerminateProcess
RtlUnhandledExceptionFilter
RtlUnwind
NtQueryVirtualMemory
DbgBreakPoint
RtlAllocateHeap
RtlUnicodeStringToAnsiString
RtlNormalizeProcessParams
NtDelayExecution
isprint
swprintf
_allmul
_alldiv
NtReadFile
NtDeviceIoControlFile
_chkstk
NtFsControlFile
NtOpenFile
NtQueryInformationFile
NtWriteFile
memmove
NtQueryVolumeInformationFile
RtlOemToUnicodeN
RtlMultiByteToUnicodeN
RtlUnicodeToOemN
RtlUnicodeToMultiByteN
sprintf
_wcsupr
_wcslwr
wcscmp
wcsspn
atol
RtlFreeUnicodeString
RtlDosPathNameToNtPathName_U
NtShutdownSystem
NtAdjustPrivilegesToken
NtOpenProcessToken
NtQuerySystemTime
NtQuerySystemInformation
NtSetInformationFile
NtCreateFile
RtlValidRelativeSecurityDescriptor
RtlExpandEnvironmentStrings_U
NtSetThreadExecutionState
_aulldiv
RtlFreeHeap
RtlSizeHeap
qsort
NtDisplayString
NtWaitForMultipleObjects
NtCreateEvent
RtlFormatMessage
RtlAnsiStringToUnicodeString
RtlInitAnsiString
RtlFindMessage
wcscpy
wcsncmp
RtlQueryRegistryValues
RtlWriteRegistryValue
RtlSubAuthoritySid
RtlInitializeSid
RtlLengthRequiredSid
RtlAddAce
RtlCopySid
RtlLengthSid
RtlQueryInformationAcl
RtlCreateAcl
RtlAddAccessAllowedAce
RtlLengthSecurityDescriptor
RtlValidSecurityDescriptor
RtlNewSecurityObject
RtlSetDaclSecurityDescriptor
RtlSetGroupSecurityDescriptor
RtlCreateSecurityDescriptor
RtlTimeToTimeFields
RtlSystemTimeToLocalTime
_allrem
RtlDecompressBuffer
RtlUpcaseUnicodeString
RtlRaiseStatus
NtTerminateThread
NtSetEvent
NtWaitForSingleObject
NtQueryInformationThread
RtlCreateUserThread
RtlComputeCrc32
DbgPrint
RtlDeleteElementGenericTable
RtlFindSetBits
RtlClearBits
RtlInitializeBitMap
RtlLookupElementGenericTable
RtlNumberOfSetBits
RtlEnumerateGenericTableWithoutSplaying
RtlSetBits
RtlInsertElementGenericTable
RtlInitializeGenericTable
NtQueryPerformanceCounter
Sections
.text Size: 366KB - Virtual size: 365KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 179KB - Virtual size: 179KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ