OLEView.pdb
Static task
static1
Behavioral task
behavioral1
Sample
935e04f63b49eeffacbba463ebf66610_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
935e04f63b49eeffacbba463ebf66610_NeikiAnalytics.exe
-
Size
798KB
-
MD5
935e04f63b49eeffacbba463ebf66610
-
SHA1
3b00863fc3448cde3d3c2e18a83b6867da2ccdf5
-
SHA256
7bb5e9b69881f145d1fc4d4f31de830cb5e542d89ece922139441a73a9461306
-
SHA512
4c541e54705cc07a7d3da743847e8ffaf4db4827d8e8fcdc6db6ef8d33b72aaa8d36d01821d5e37544daa63b28912230c5a24af07c36bb484cd1873b399ddd09
-
SSDEEP
12288:pxS4wt0MPsUjxU7P/mqmFrfBCgiw4bivhqGoj85sVPL5qw+Dc:pxS6MjjxgPeqMrfUgYbkhqfj8uqw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 935e04f63b49eeffacbba463ebf66610_NeikiAnalytics.exe
Files
-
935e04f63b49eeffacbba463ebf66610_NeikiAnalytics.exe.exe windows:10 windows x64 arch:x64
383cdbd2c033ce7048e292e489d6f766
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueW
GetSecurityDescriptorLength
MakeSelfRelativeSD
RegSetValueExW
RegEnumKeyW
RegOpenKeyW
RegDeleteKeyW
RegEnumKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegEnumValueW
GetAce
GetSecurityDescriptorDacl
MakeAbsoluteSD
MapGenericMask
SetSecurityDescriptorDacl
LookupAccountSidW
SetEntriesInAclW
GetExplicitEntriesFromAclW
OpenProcessToken
AddAccessAllowedAce
AddAce
CopySid
EqualSid
GetAclInformation
GetLengthSid
GetTokenInformation
InitializeAcl
InitializeSecurityDescriptor
IsValidSid
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
LookupAccountNameW
RegCreateKeyExW
RegDeleteValueW
AllocateAndInitializeSid
FreeSid
kernel32
GetModuleHandleW
GetProcAddress
LoadLibraryW
lstrcpyW
lstrcmpW
lstrlenW
lstrcmpiW
GetLastError
WinExec
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SuspendThread
GetTickCount
LoadLibraryExW
GlobalAlloc
GlobalUnlock
GlobalLock
GetSystemDefaultLCID
GetUserDefaultLCID
LocalAlloc
LocalFree
CloseHandle
GetCurrentProcess
lstrcatW
FormatMessageW
Sleep
VirtualProtect
FreeLibrary
ResumeThread
GetVersionExW
IsProcessorFeaturePresent
IsDebuggerPresent
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
GetStartupInfoW
GetModuleFileNameW
gdi32
DeleteObject
user32
SetActiveWindow
GetMessagePos
OpenClipboard
CloseClipboard
SetCursor
EmptyClipboard
RedrawWindow
LoadMenuW
EnableMenuItem
GetSubMenu
DeleteMenu
GetWindowRect
EnableWindow
SendMessageW
UpdateWindow
GetFocus
LoadCursorW
LoadIconW
wsprintfW
MessageBoxW
SetClipboardData
ScreenToClient
LoadBitmapW
mfc42u
ord1259
ord4262
ord626
ord624
ord1122
ord1284
ord2846
ord4473
ord1040
ord1463
ord4770
ord4983
ord4371
ord3164
ord4077
ord4083
ord4082
ord3046
ord3166
ord3052
ord3366
ord3231
ord4815
ord3362
ord3243
ord3049
ord6351
ord852
ord5711
ord5730
ord4368
ord5722
ord3468
ord2412
ord1471
ord1441
ord3916
ord659
ord6509
ord3681
ord6841
ord1337
ord5615
ord1388
ord4191
ord6071
ord2515
ord2559
ord4836
ord6813
ord4970
ord2752
ord6053
ord5065
ord5724
ord1063
ord598
ord1499
ord372
ord2518
ord3652
ord1505
ord408
ord2106
ord4598
ord2329
ord665
ord5699
ord2140
ord2457
ord5683
ord1736
ord6612
ord6102
ord5484
ord2661
ord3933
ord4548
ord6767
ord6814
ord2060
ord2670
ord4789
ord5229
ord4017
ord5712
ord4694
ord6812
ord5586
ord2393
ord2399
ord5663
ord4752
ord1778
ord4365
ord4988
ord6440
ord3535
ord337
ord2517
ord5077
ord5406
ord4721
ord5702
ord4771
ord1777
ord6437
ord5687
ord3743
ord2586
ord822
ord4741
ord3806
ord2593
ord912
ord4747
ord3501
ord1812
ord4557
ord1126
ord2384
ord2328
ord6614
ord4130
ord3774
ord867
ord3761
ord2665
ord5245
ord3418
ord1677
ord2676
ord6632
ord339
ord2094
ord3894
ord1035
ord4405
ord4879
ord4884
ord4881
ord4899
ord4901
ord4886
ord5288
ord4712
ord5297
ord4945
ord4946
ord3932
ord4780
ord5682
ord5662
ord6525
ord1023
ord1734
ord5284
ord5366
ord5369
ord5449
ord385
ord5086
ord4888
ord2099
ord5703
ord4688
ord4681
ord6439
ord3911
ord1056
ord3531
ord3902
ord2598
ord1044
ord4751
ord3527
ord6634
ord1837
ord4564
ord549
ord4699
ord5352
ord5246
ord4722
ord5382
ord5114
ord5304
ord5583
ord5585
ord5584
ord999
ord5227
ord5709
ord1906
ord4582
ord1124
ord351
ord6586
ord6464
ord3282
ord3601
ord4732
ord2414
ord5250
ord5359
ord4766
ord5988
ord3254
ord5894
ord1752
ord6080
ord5665
ord863
ord2547
ord2513
ord6769
ord3146
ord3140
ord5063
ord4984
ord4773
ord1821
ord4561
ord561
ord560
ord2532
ord1365
ord1003
ord5710
ord1698
ord4787
ord5082
ord2059
ord4779
ord1908
ord4583
ord2783
ord3177
ord4131
ord4127
ord4424
ord3751
ord2589
ord4542
ord2023
ord2422
ord832
ord4743
ord2975
ord5887
ord2408
ord1562
ord3748
ord3484
ord4014
ord2906
ord4124
ord6610
ord2565
ord387
ord4461
ord2919
ord6202
ord2920
ord3536
ord5839
ord1316
ord1674
ord2671
ord6624
ord5420
ord3481
ord4633
ord890
ord4364
ord4774
ord5524
ord5521
ord3141
ord5704
ord2405
ord2750
ord5674
ord4784
ord5659
ord4806
ord4849
ord3682
ord6842
ord6235
ord613
ord2133
ord6379
ord3638
ord6455
ord1036
ord647
ord2136
ord4476
ord1053
ord611
ord2268
ord3044
ord6284
ord3637
ord1034
ord485
ord5865
ord6023
ord4900
ord4880
ord4885
ord963
ord3380
ord1838
ord4565
ord622
ord1262
ord3830
ord4375
ord568
ord5950
ord1381
ord5925
ord1006
ord2900
ord3820
ord2449
ord2903
ord1650
ord6691
ord2595
ord4544
ord5367
ord5370
ord5285
ord5090
ord4690
ord4682
ord5496
ord1061
ord1735
ord328
ord4887
ord1404
ord6762
ord1566
ord4181
ord2902
ord3912
ord5681
ord4858
ord3532
ord629
ord1043
ord3754
ord1869
ord1943
ord4596
ord1584
msvcrt
_cexit
__setusermatherr
_initterm
__C_specific_handler
_wcmdln
_fmode
_commode
_lock
_unlock
__dllonexit
_onexit
??1type_info@@UEAA@XZ
?terminate@@YAXXZ
wcsrchr
_exit
__set_app_type
__wgetmainargs
_amsg_exit
_XcptFilter
_callnewh
__CxxFrameHandler
free
malloc
_vsnwprintf
wcstok
_wcsnicmp
wcstol
_wtoi
_itow
memset
exit
memcpy
toupper
isspace
isxdigit
isdigit
_wcsicmp
comctl32
ImageList_AddMasked
shell32
DragFinish
DragQueryFileW
ExtractIconW
ShellAboutW
shlwapi
wnsprintfW
ole32
MkParseDisplayName
CoTaskMemFree
StringFromCLSID
CoGetClassObject
CreateBindCtx
StringFromGUID2
CLSIDFromProgID
CoCreateInstance
CoFreeUnusedLibraries
CLSIDFromString
oleaut32
LoadRegTypeLi
LoadTypeLi
Sections
.text Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 572KB - Virtual size: 576KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE