t:\onenote\x86\ship\0\onenotem.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ab365d79fd96f2d40fd468b59097b190_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ab365d79fd96f2d40fd468b59097b190_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
ab365d79fd96f2d40fd468b59097b190_NeikiAnalytics.exe
-
Size
654KB
-
MD5
ab365d79fd96f2d40fd468b59097b190
-
SHA1
e7c80478c08e16347cec3971f4d9a60198c1d17c
-
SHA256
5ac8f4295a8ba7e4c363cbb4113cd3e6a894577defa5e6ade5c21756125c84bf
-
SHA512
ac4f621f002130834b015ae0904198b545283f16e365a62dde2ca94e83b5af44df6e072d4ab7a045351b063498cc2a1071a53b8db100c86bb2d57a28c2429edb
-
SSDEEP
12288:NfVqKNdQ8yRK6rkObwsToHOOWGgqvoEWH/lInNg4JYU5a0Cuxy:NfVqIi2lObXobHAEW9INFJY0au
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab365d79fd96f2d40fd468b59097b190_NeikiAnalytics.exe
Files
-
ab365d79fd96f2d40fd468b59097b190_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
aedb9851f0d6a766e18e5c076b04b852
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetProcessWorkingSetSize
GetCurrentProcess
HeapCompact
GetProcessHeap
CloseHandle
CreateProcessW
FreeLibrary
GetProcAddress
LoadLibraryW
GetLastError
CreateFileMappingW
GlobalLock
GlobalUnlock
GlobalFree
GlobalAlloc
GetModuleHandleW
GetVersionExW
Sleep
GetCommandLineW
GetCurrentThreadId
ReleaseMutex
UnmapViewOfFile
MapViewOfFile
WaitForSingleObject
CreateMutexW
ResumeThread
CreateThread
CompareStringW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
CreateProcessA
LoadLibraryA
LocalAlloc
RaiseException
FoldStringW
GetLocaleInfoW
GetStringTypeW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
HeapAlloc
HeapFree
GetTempPathA
GetTempFileNameA
VirtualProtect
user32
PostMessageA
PostThreadMessageA
IsWindow
CreatePopupMenu
AppendMenuW
EnableMenuItem
SetMenuDefaultItem
CheckMenuItem
GetCursorPos
TrackPopupMenu
DestroyMenu
SendMessageW
RedrawWindow
EnumDisplayMonitors
FillRect
SetForegroundWindow
SetFocus
SetCapture
SetRectEmpty
DefWindowProcW
LoadCursorW
SetCursor
RegisterWindowMessageW
LoadIconW
RegisterClassExW
CreateWindowExW
GetDC
OpenClipboard
EmptyClipboard
RegisterClipboardFormatW
SetClipboardData
CloseClipboard
ReleaseDC
ShowWindow
WindowFromPoint
IsChild
LoadImageW
RegisterHotKey
GetMessageW
DispatchMessageW
TranslateMessage
UnregisterHotKey
InvalidateRect
SetRect
DestroyWindow
PostQuitMessage
IsRectEmpty
GetSysColorBrush
FrameRect
InflateRect
BeginPaint
EndPaint
UnionRect
LoadStringW
MessageBoxW
PostMessageW
SystemParametersInfoW
msvcr80
memmove
memcpy
_controlfp_s
_invoke_watson
_except_handler4_common
_crt_debugger_hook
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
__set_app_type
memset
__CxxFrameHandler3
wcscat_s
wcscpy_s
_CxxThrowException
wcsrchr
vswprintf_s
vsprintf_s
fclose
fwprintf_s
fopen_s
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
?_type_info_dtor_internal_method@type_info@@QAEXXZ
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE