D:\SVA\NITRO\BotGenStudio\Interface\Generations\80051A85\bin\bot.pdb
Static task
static1
Behavioral task
behavioral1
Sample
78c579cbd2af0e0b851eb6432751a2f0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
78c579cbd2af0e0b851eb6432751a2f0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
78c579cbd2af0e0b851eb6432751a2f0_NeikiAnalytics.exe
-
Size
174KB
-
MD5
78c579cbd2af0e0b851eb6432751a2f0
-
SHA1
74ef8c809a1d7825d6d35de073bdab761cfc9edc
-
SHA256
ddc4d35c20606c73e334530865535d1cca892080e53cd021d0788edb88082210
-
SHA512
78861e094876dab5d14e2aca4ed8fdca0d7ffd244972381905c0a7e2d58f7a8c52e854fd3004a4716ee700781bf05377ea91bf9c71129b66910ecafe3260d945
-
SSDEEP
3072:KZ/LhS0rKgHq+rFLIwgoovufDUbZMYIWJkzd5Se:+/LhS0rKE/FLITo9mpIWWz7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 78c579cbd2af0e0b851eb6432751a2f0_NeikiAnalytics.exe
Files
-
78c579cbd2af0e0b851eb6432751a2f0_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
edf0659abd5188c18e493cb2537cb8d9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ReadFile
CreateFileW
GetFileSizeEx
FindNextFileW
DeleteFileW
SetFileAttributesW
GetVolumeNameForVolumeMountPointW
HeapReAlloc
HeapCompact
HeapAlloc
HeapFree
HeapCreate
SetLastError
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetVersionExW
LocalAlloc
LocalFree
CreateNamedPipeW
GetCommandLineW
CreateMutexW
GetDriveTypeW
FileTimeToSystemTime
OpenMutexW
ReleaseMutex
GetVolumeInformationW
ExpandEnvironmentStringsW
GetFileSize
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
GlobalLock
GlobalUnlock
lstrcpynA
lstrcmpiA
SetCurrentDirectoryW
FindVolumeClose
FindNextVolumeW
GetVolumePathNamesForVolumeNameW
FindNextVolumeMountPointW
GetCurrentDirectoryW
FindVolumeMountPointClose
FindFirstVolumeMountPointW
GetFileAttributesW
GetDiskFreeSpaceExW
FileTimeToLocalFileTime
FindFirstVolumeW
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
GetStringTypeW
LCMapStringW
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetSystemWow64DirectoryW
GetSystemDirectoryW
WriteFile
SetFileTime
SetFilePointer
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
lstrcpyA
GetSystemTime
LoadLibraryW
GetLocalTime
FindClose
MoveFileW
SetThreadPriority
lstrcmpW
GetACP
FreeConsole
CopyFileW
GetCurrentThread
GetTickCount
GetModuleHandleW
SleepEx
SystemTimeToFileTime
SetUnhandledExceptionFilter
CreateProcessW
FreeLibrary
SetErrorMode
lstrlenA
FindFirstFileW
ExitProcess
GetCurrentProcess
GetExitCodeThread
ExitThread
CreateThread
CloseHandle
TerminateThread
WaitForSingleObject
Sleep
lstrcpyW
GetWindowsDirectoryW
lstrcatW
GetTempPathW
lstrlenW
GetModuleFileNameW
GetComputerNameW
GetEnvironmentVariableW
GetLastError
MultiByteToWideChar
IsValidCodePage
InterlockedDecrement
InterlockedIncrement
GetCPInfo
HeapSize
RaiseException
IsProcessorFeaturePresent
GetStartupInfoW
HeapSetInformation
GetCommandLineA
DecodePointer
EncodePointer
IsBadReadPtr
lstrcmpiW
GetProcAddress
lstrcpynW
GetOEMCP
user32
ShowWindow
SetWindowLongW
PeekMessageW
GetWindowTextW
GetAsyncKeyState
RegisterRawInputDevices
RegisterClassExW
GetKeyboardState
GetRawInputData
PostQuitMessage
CreateWindowExW
DefWindowProcW
GetWindowThreadProcessId
ToUnicodeEx
DispatchMessageW
GetKeyboardType
wsprintfW
GetKeyboardLayout
wsprintfA
GetMessageW
UnregisterDeviceNotification
RegisterDeviceNotificationW
OpenClipboard
GetClipboardData
CloseClipboard
GetForegroundWindow
GetKeyboardLayoutNameW
CharLowerW
advapi32
CryptGenRandom
LookupPrivilegeValueW
AdjustTokenPrivileges
CloseServiceHandle
LookupAccountSidA
QueryServiceStatus
CryptHashData
CryptDestroyHash
CryptDestroyKey
CryptCreateHash
CryptEncrypt
CryptImportKey
CryptReleaseContext
CryptSetKeyParam
CryptGetHashParam
SetEntriesInAclW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegEnumValueW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegOpenKeyW
RegQueryValueExW
RegCreateKeyExW
RegEnumKeyW
GetTokenInformation
OpenThreadToken
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
GetUserNameW
ChangeServiceConfigW
StartServiceW
OpenServiceW
OpenSCManagerW
CryptAcquireContextW
OpenProcessToken
shell32
ShellExecuteExW
CommandLineToArgvW
SHGetFolderPathW
ole32
CoInitializeSecurity
CoUninitialize
CoInitialize
IIDFromString
CoTaskMemFree
StringFromIID
CoCreateInstance
oleaut32
VariantChangeType
VariantInit
SysAllocString
VariantClear
rpcrt4
UuidCreate
RpcStringFreeW
UuidToStringW
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationW
secur32
GetComputerObjectNameW
wininet
InternetGetConnectedState
InternetGetLastResponseInfoW
ws2_32
WSAStartup
WSACleanup
shlwapi
PathAppendW
PathFindExtensionW
StrStrA
PathAddBackslashW
PathRemoveFileSpecW
crypt32
CryptUnprotectData
mpr
WNetCancelConnectionW
WNetAddConnection2W
Sections
.text Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 992B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ