D:\SVA\NITRO\BotGenStudio\Interface\Generations\80051A85\bin\bot.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1f0c2e92edf96d3a2998f38db55f6e30_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1f0c2e92edf96d3a2998f38db55f6e30_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1f0c2e92edf96d3a2998f38db55f6e30_NeikiAnalytics.exe
-
Size
174KB
-
MD5
1f0c2e92edf96d3a2998f38db55f6e30
-
SHA1
1b79f1b77f1b0b775765f1232efd654381d60de5
-
SHA256
02a3511ac10056e204c9d219ddc84176fc748cc88920ffdd25b36c54304215bd
-
SHA512
848585a013bad77d02a71b644e6bee4cddd247833bf70e77c023ad9e02cc9279c146a33960e12579a37fba90accdf96a4362085f9ee3ff38725818bf2b9315d2
-
SSDEEP
3072:KZ/LhS0rKgHq+rFLIwgoovufDUbZPYIWJkpq5Se:+/LhS0rKE/FLITo9mKIWWpk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1f0c2e92edf96d3a2998f38db55f6e30_NeikiAnalytics.exe
Files
-
1f0c2e92edf96d3a2998f38db55f6e30_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
edf0659abd5188c18e493cb2537cb8d9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ReadFile
CreateFileW
GetFileSizeEx
FindNextFileW
DeleteFileW
SetFileAttributesW
GetVolumeNameForVolumeMountPointW
HeapReAlloc
HeapCompact
HeapAlloc
HeapFree
HeapCreate
SetLastError
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetVersionExW
LocalAlloc
LocalFree
CreateNamedPipeW
GetCommandLineW
CreateMutexW
GetDriveTypeW
FileTimeToSystemTime
OpenMutexW
ReleaseMutex
GetVolumeInformationW
ExpandEnvironmentStringsW
GetFileSize
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
GlobalLock
GlobalUnlock
lstrcpynA
lstrcmpiA
SetCurrentDirectoryW
FindVolumeClose
FindNextVolumeW
GetVolumePathNamesForVolumeNameW
FindNextVolumeMountPointW
GetCurrentDirectoryW
FindVolumeMountPointClose
FindFirstVolumeMountPointW
GetFileAttributesW
GetDiskFreeSpaceExW
FileTimeToLocalFileTime
FindFirstVolumeW
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
GetStringTypeW
LCMapStringW
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetSystemWow64DirectoryW
GetSystemDirectoryW
WriteFile
SetFileTime
SetFilePointer
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
lstrcpyA
GetSystemTime
LoadLibraryW
GetLocalTime
FindClose
MoveFileW
SetThreadPriority
lstrcmpW
GetACP
FreeConsole
CopyFileW
GetCurrentThread
GetTickCount
GetModuleHandleW
SleepEx
SystemTimeToFileTime
SetUnhandledExceptionFilter
CreateProcessW
FreeLibrary
SetErrorMode
lstrlenA
FindFirstFileW
ExitProcess
GetCurrentProcess
GetExitCodeThread
ExitThread
CreateThread
CloseHandle
TerminateThread
WaitForSingleObject
Sleep
lstrcpyW
GetWindowsDirectoryW
lstrcatW
GetTempPathW
lstrlenW
GetModuleFileNameW
GetComputerNameW
GetEnvironmentVariableW
GetLastError
MultiByteToWideChar
IsValidCodePage
InterlockedDecrement
InterlockedIncrement
GetCPInfo
HeapSize
RaiseException
IsProcessorFeaturePresent
GetStartupInfoW
HeapSetInformation
GetCommandLineA
DecodePointer
EncodePointer
IsBadReadPtr
lstrcmpiW
GetProcAddress
lstrcpynW
GetOEMCP
user32
ShowWindow
SetWindowLongW
PeekMessageW
GetWindowTextW
GetAsyncKeyState
RegisterRawInputDevices
RegisterClassExW
GetKeyboardState
GetRawInputData
PostQuitMessage
CreateWindowExW
DefWindowProcW
GetWindowThreadProcessId
ToUnicodeEx
DispatchMessageW
GetKeyboardType
wsprintfW
GetKeyboardLayout
wsprintfA
GetMessageW
UnregisterDeviceNotification
RegisterDeviceNotificationW
OpenClipboard
GetClipboardData
CloseClipboard
GetForegroundWindow
GetKeyboardLayoutNameW
CharLowerW
advapi32
CryptGenRandom
LookupPrivilegeValueW
AdjustTokenPrivileges
CloseServiceHandle
LookupAccountSidA
QueryServiceStatus
CryptHashData
CryptDestroyHash
CryptDestroyKey
CryptCreateHash
CryptEncrypt
CryptImportKey
CryptReleaseContext
CryptSetKeyParam
CryptGetHashParam
SetEntriesInAclW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegEnumValueW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegOpenKeyW
RegQueryValueExW
RegCreateKeyExW
RegEnumKeyW
GetTokenInformation
OpenThreadToken
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
GetUserNameW
ChangeServiceConfigW
StartServiceW
OpenServiceW
OpenSCManagerW
CryptAcquireContextW
OpenProcessToken
shell32
ShellExecuteExW
CommandLineToArgvW
SHGetFolderPathW
ole32
CoInitializeSecurity
CoUninitialize
CoInitialize
IIDFromString
CoTaskMemFree
StringFromIID
CoCreateInstance
oleaut32
VariantChangeType
VariantInit
SysAllocString
VariantClear
rpcrt4
UuidCreate
RpcStringFreeW
UuidToStringW
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationW
secur32
GetComputerObjectNameW
wininet
InternetGetConnectedState
InternetGetLastResponseInfoW
ws2_32
WSAStartup
WSACleanup
shlwapi
PathAppendW
PathFindExtensionW
StrStrA
PathAddBackslashW
PathRemoveFileSpecW
crypt32
CryptUnprotectData
mpr
WNetCancelConnectionW
WNetAddConnection2W
Sections
.text Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 992B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ