tracerpt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
149993a75cfdf42a25041a76587e3de0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
149993a75cfdf42a25041a76587e3de0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
149993a75cfdf42a25041a76587e3de0_NeikiAnalytics.exe
-
Size
385KB
-
MD5
149993a75cfdf42a25041a76587e3de0
-
SHA1
6aca2c280b98621b176de8489c9f6080f8c12665
-
SHA256
09b08b56a580e713548e5729d11d33708995520a968853a0191a84ec2e5bbec1
-
SHA512
198472e95d2198ff1ae4c268f3cdfccccf113209a8a307a531a27fe890c8c5182c2a3500abd051abda935252b25444d00f5cb900b3c82e2edfd33fd0fa1ddbe5
-
SSDEEP
12288:lSkqChOZGRQGwJEC6jLeSwJEC6jLeR7ob:ls7GRwPHob
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 149993a75cfdf42a25041a76587e3de0_NeikiAnalytics.exe
Files
-
149993a75cfdf42a25041a76587e3de0_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
f669e086134239088f1b1940e23fb298
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegisterTraceGuidsW
StartTraceW
TraceEvent
LookupAccountSidA
LookupAccountSidW
OpenTraceW
ProcessTrace
CloseTrace
StopTraceW
kernel32
FindClose
FindNextFileW
FindFirstFileW
SetThreadLocale
GetSystemDefaultLCID
GetConsoleOutputCP
GetThreadLocale
GetUserDefaultUILanguage
LocalFree
WriteFile
WriteConsoleW
GetFileType
FormatMessageW
GetModuleHandleW
GetModuleFileNameW
ReadConsoleW
MultiByteToWideChar
ReadFile
SetConsoleMode
GetConsoleMode
CloseHandle
CreateFileW
SystemTimeToFileTime
FreeLibrary
LoadLibraryW
DeleteFileW
LockResource
LoadResource
FindResourceW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetVersionExA
ExitProcess
GetLastError
GetModuleHandleA
GetACP
GetOEMCP
GetCPInfo
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
WideCharToMultiByte
VirtualProtect
GetSystemInfo
VirtualQuery
LCMapStringA
LCMapStringW
RtlUnwind
InterlockedExchange
GetStringTypeA
GetStringTypeW
LoadLibraryA
VirtualAlloc
HeapReAlloc
SetFilePointer
GetLocaleInfoA
RaiseException
SetStdHandle
FlushFileBuffers
SetEndOfFile
Sleep
lstrlenA
FileTimeToLocalFileTime
FileTimeToSystemTime
SetLastError
ExpandEnvironmentStringsW
GetStringTypeExW
GetLocaleInfoW
SetConsoleTextAttribute
GetStdHandle
GetConsoleScreenBufferInfo
GetProcessHeap
HeapAlloc
HeapFree
GetProcAddress
SetEvent
lstrlenW
GetLocalTime
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
user32
LoadStringW
CharToOemW
wsprintfW
rpcrt4
UuidCreate
ole32
CoCreateInstance
CoInitialize
CoSetProxyBlanket
oleaut32
SafeArrayUnaccessData
VariantClear
SysAllocString
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SysFreeString
SafeArrayGetElement
VariantInit
VariantChangeType
SafeArrayDestroy
ntdll
RtlLeaveCriticalSection
RtlDeleteCriticalSection
RtlInitializeCriticalSection
RtlFreeUnicodeString
RtlStringFromGUID
RtlEnterCriticalSection
RtlAnsiCharToUnicodeChar
Sections
.text Size: 141KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 238KB - Virtual size: 239KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE