d:\CCViews\autobuild1_BR-0511-0307_1.0_Snapshot\SSE_EastFork\Ccu\Source\Ccu\CCU_TrayIcon\Release\CCU_TrayIcon.pdb
Static task
static1
Behavioral task
behavioral1
Sample
084ec65d079c29df53a23fe5a0f69670_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
084ec65d079c29df53a23fe5a0f69670_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
084ec65d079c29df53a23fe5a0f69670_NeikiAnalytics.exe
-
Size
284KB
-
MD5
084ec65d079c29df53a23fe5a0f69670
-
SHA1
4632c3e197dfd6573e3e99b50feeec8d05e44b83
-
SHA256
ff5df850ea5042df24d11588f182d6c5642e0683a842d3b42e6ee53ad9dbd895
-
SHA512
73900fc3abb1f379b3e4a2607d0957ec31fa66529651858bf8be806b82976461bdf06a67186abffdd83f63caf0dc3b74a92d2f9d8cd1bee9487107413ee916ea
-
SSDEEP
6144:51deMhd0mU57LJL/4goGIHx2fAr+6a9q:MZ5Gt20+6a9q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 084ec65d079c29df53a23fe5a0f69670_NeikiAnalytics.exe
Files
-
084ec65d079c29df53a23fe5a0f69670_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
ab2b216499bd854146cccd1cbee220d2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemInfo
VirtualProtect
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
IsBadCodePtr
IsBadReadPtr
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
WriteFile
GetCPInfo
GetOEMCP
HeapSize
GetCurrentProcess
GetProcAddress
VirtualQuery
SetUnhandledExceptionFilter
GetModuleFileNameA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
HeapReAlloc
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
HeapAlloc
RtlUnwind
ExitProcess
HeapFree
LocalFree
lstrlenA
GetCurrentThreadId
FormatMessageA
MulDiv
lstrcpynA
CreateMutexA
GetLastError
LoadLibraryA
InterlockedDecrement
MultiByteToWideChar
InterlockedExchange
OpenFileMappingA
MapViewOfFile
WideCharToMultiByte
UnmapViewOfFile
CloseHandle
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
TerminateProcess
user32
IsWindow
GetWindowLongA
SetWindowLongA
SetWindowRgn
SetLayeredWindowAttributes
LoadBitmapA
SendMessageA
BeginPaint
GetClientRect
DrawTextA
EndPaint
InvalidateRect
DestroyMenu
GetCursorPos
SetForegroundWindow
TrackPopupMenu
CreatePopupMenu
AppendMenuA
SetTimer
LoadImageA
DestroyIcon
SetWindowPos
ShowWindow
MoveWindow
SystemParametersInfoA
GetSystemMetrics
KillTimer
DestroyWindow
GetMenuItemCount
InsertMenuItemA
GetMessageA
TranslateMessage
DispatchMessageA
FindWindowA
PostMessageA
LoadStringA
LoadIconA
UpdateWindow
CreateWindowExA
RegisterClassExA
DefWindowProcA
PostQuitMessage
LoadCursorA
gdi32
SelectObject
GetObjectA
StretchBlt
SetBkMode
CreateCompatibleDC
DeleteDC
SaveDC
SetGraphicsMode
ModifyWorldTransform
GetDeviceCaps
CreateFontIndirectA
RestoreDC
CreateRoundRectRgn
SetTextColor
DeleteObject
advapi32
DeregisterEventSource
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegisterEventSourceA
ReportEventA
shell32
Shell_NotifyIconA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
VariantClear
VarBstrCmp
SysAllocStringByteLen
SysFreeString
SysAllocString
SysStringLen
SysAllocStringLen
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 220KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ