D:\SVA\NITRO\BotGenStudio\Interface\Generations\80051A85\bin\bot.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7fdfc1788533b5ab68307d348072b4d0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7fdfc1788533b5ab68307d348072b4d0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
7fdfc1788533b5ab68307d348072b4d0_NeikiAnalytics.exe
-
Size
174KB
-
MD5
7fdfc1788533b5ab68307d348072b4d0
-
SHA1
416c5bd75e37a036ca0bc2ef2b22cbc289e24df6
-
SHA256
a095cc41c451fc5f85c9cdd51b34794c3b0966fe2c8c23d275bac416e4bd9b06
-
SHA512
31eeeafcc1224f179ad9ab04e10d9d57ea5ac17cae2a9443be21a5060056d6b2f6f621402219df992d0c5d1b7014bf08bb1c18510409b60b458f6f35b4a0d42c
-
SSDEEP
3072:KZ/LhS0rKgHq+rFLIwgoovufDUbZsYIWJk+75Se:+/LhS0rKE/FLITo9mlIWW+d
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7fdfc1788533b5ab68307d348072b4d0_NeikiAnalytics.exe
Files
-
7fdfc1788533b5ab68307d348072b4d0_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
edf0659abd5188c18e493cb2537cb8d9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ReadFile
CreateFileW
GetFileSizeEx
FindNextFileW
DeleteFileW
SetFileAttributesW
GetVolumeNameForVolumeMountPointW
HeapReAlloc
HeapCompact
HeapAlloc
HeapFree
HeapCreate
SetLastError
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetVersionExW
LocalAlloc
LocalFree
CreateNamedPipeW
GetCommandLineW
CreateMutexW
GetDriveTypeW
FileTimeToSystemTime
OpenMutexW
ReleaseMutex
GetVolumeInformationW
ExpandEnvironmentStringsW
GetFileSize
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
GlobalLock
GlobalUnlock
lstrcpynA
lstrcmpiA
SetCurrentDirectoryW
FindVolumeClose
FindNextVolumeW
GetVolumePathNamesForVolumeNameW
FindNextVolumeMountPointW
GetCurrentDirectoryW
FindVolumeMountPointClose
FindFirstVolumeMountPointW
GetFileAttributesW
GetDiskFreeSpaceExW
FileTimeToLocalFileTime
FindFirstVolumeW
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
GetStringTypeW
LCMapStringW
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetSystemWow64DirectoryW
GetSystemDirectoryW
WriteFile
SetFileTime
SetFilePointer
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
lstrcpyA
GetSystemTime
LoadLibraryW
GetLocalTime
FindClose
MoveFileW
SetThreadPriority
lstrcmpW
GetACP
FreeConsole
CopyFileW
GetCurrentThread
GetTickCount
GetModuleHandleW
SleepEx
SystemTimeToFileTime
SetUnhandledExceptionFilter
CreateProcessW
FreeLibrary
SetErrorMode
lstrlenA
FindFirstFileW
ExitProcess
GetCurrentProcess
GetExitCodeThread
ExitThread
CreateThread
CloseHandle
TerminateThread
WaitForSingleObject
Sleep
lstrcpyW
GetWindowsDirectoryW
lstrcatW
GetTempPathW
lstrlenW
GetModuleFileNameW
GetComputerNameW
GetEnvironmentVariableW
GetLastError
MultiByteToWideChar
IsValidCodePage
InterlockedDecrement
InterlockedIncrement
GetCPInfo
HeapSize
RaiseException
IsProcessorFeaturePresent
GetStartupInfoW
HeapSetInformation
GetCommandLineA
DecodePointer
EncodePointer
IsBadReadPtr
lstrcmpiW
GetProcAddress
lstrcpynW
GetOEMCP
user32
ShowWindow
SetWindowLongW
PeekMessageW
GetWindowTextW
GetAsyncKeyState
RegisterRawInputDevices
RegisterClassExW
GetKeyboardState
GetRawInputData
PostQuitMessage
CreateWindowExW
DefWindowProcW
GetWindowThreadProcessId
ToUnicodeEx
DispatchMessageW
GetKeyboardType
wsprintfW
GetKeyboardLayout
wsprintfA
GetMessageW
UnregisterDeviceNotification
RegisterDeviceNotificationW
OpenClipboard
GetClipboardData
CloseClipboard
GetForegroundWindow
GetKeyboardLayoutNameW
CharLowerW
advapi32
CryptGenRandom
LookupPrivilegeValueW
AdjustTokenPrivileges
CloseServiceHandle
LookupAccountSidA
QueryServiceStatus
CryptHashData
CryptDestroyHash
CryptDestroyKey
CryptCreateHash
CryptEncrypt
CryptImportKey
CryptReleaseContext
CryptSetKeyParam
CryptGetHashParam
SetEntriesInAclW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegEnumValueW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegOpenKeyW
RegQueryValueExW
RegCreateKeyExW
RegEnumKeyW
GetTokenInformation
OpenThreadToken
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
GetUserNameW
ChangeServiceConfigW
StartServiceW
OpenServiceW
OpenSCManagerW
CryptAcquireContextW
OpenProcessToken
shell32
ShellExecuteExW
CommandLineToArgvW
SHGetFolderPathW
ole32
CoInitializeSecurity
CoUninitialize
CoInitialize
IIDFromString
CoTaskMemFree
StringFromIID
CoCreateInstance
oleaut32
VariantChangeType
VariantInit
SysAllocString
VariantClear
rpcrt4
UuidCreate
RpcStringFreeW
UuidToStringW
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationW
secur32
GetComputerObjectNameW
wininet
InternetGetConnectedState
InternetGetLastResponseInfoW
ws2_32
WSAStartup
WSACleanup
shlwapi
PathAppendW
PathFindExtensionW
StrStrA
PathAddBackslashW
PathRemoveFileSpecW
crypt32
CryptUnprotectData
mpr
WNetCancelConnectionW
WNetAddConnection2W
Sections
.text Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 992B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ