c:\Build\PSIKey\BRANCH_ACTIVATOR_3_2_0\Parts\bin\ReleaseAntiCrack\PSIService_2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
32d19af05463e94d482ce23115b28ec0_NeikiAnalytics.exe
Resource
win7-20231129-en
General
-
Target
32d19af05463e94d482ce23115b28ec0_NeikiAnalytics.exe
-
Size
1.4MB
-
MD5
32d19af05463e94d482ce23115b28ec0
-
SHA1
8b17a72065daad14fe883a7289b88be72cdbcabe
-
SHA256
8829b9711fd6a3b05a9b39b2be1fb179bc29a6f390f365ce787221ffdcb87377
-
SHA512
2afcb637d48db3aea9f325259df5755c2f25b9f7fefe33ee9f1e76e2e124a5eaa78548dbdde2d9aca90cb822d91b439914feda8818f82853c7633ee07b1a1be8
-
SSDEEP
24576:xtQchlSTKUb56wBouJ93vrIdpRxmm1EH2JXD:L5vSTKUdzBoqvMpRx31Y2JXD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 32d19af05463e94d482ce23115b28ec0_NeikiAnalytics.exe
Files
-
32d19af05463e94d482ce23115b28ec0_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
5cce9326c999417aa97670acc4cb6c19
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
rpcrt4
RpcServerListen
RpcServerRegisterIf
RpcServerUseProtseqEpA
NdrServerCall2
RpcMgmtStopServerListening
kernel32
VirtualAlloc
HeapReAlloc
HeapSize
Sleep
ExitProcess
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
HeapCreate
VirtualFree
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
RaiseException
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
RtlUnwind
GetCommandLineA
HeapAlloc
HeapFree
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetOEMCP
GetCPInfo
GetLocaleInfoA
GlobalFlags
CreateFileA
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
lstrcmpA
GlobalGetAtomNameA
InterlockedIncrement
GetModuleHandleW
CompareStringA
GetCurrentThreadId
CloseHandle
FormatMessageA
MultiByteToWideChar
lstrlenA
GetCurrentProcessId
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
InterlockedDecrement
TlsFree
GlobalFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalAlloc
GlobalHandle
GlobalUnlock
GlobalReAlloc
GlobalLock
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
GetLastError
SetLastError
FreeLibrary
LoadLibraryA
GetSystemInfo
GetVersionExA
LocalFree
LocalAlloc
GetModuleHandleA
GetProcAddress
FindFirstFileA
SetEvent
WaitForSingleObject
CreateThread
CreateEventA
lstrcmpiA
GetModuleFileNameA
GetEnvironmentStringsW
user32
PostQuitMessage
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
ClientToScreen
SetWindowTextA
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
UnhookWindowsHookEx
MessageBoxA
EnableWindow
IsWindowEnabled
SetForegroundWindow
GetClientRect
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
PtInRect
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
SetPropA
GetLastActivePopup
GetWindowLongA
GetParent
SendMessageA
GetWindowThreadProcessId
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetWindowTextA
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
gdi32
GetStockObject
SetViewportExtEx
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
GetClipBox
CreateBitmap
GetDeviceCaps
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
DeleteObject
SetBkColor
SetTextColor
ScaleViewportExtEx
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
ReportEventA
DeregisterEventSource
RegSetValueExA
RegCreateKeyExA
RegCloseKey
QueryServiceConfigA
UnlockServiceDatabase
LockServiceDatabase
DeleteService
StartServiceA
CreateServiceA
ControlService
CloseServiceHandle
OpenServiceA
OpenSCManagerA
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
RegisterEventSourceA
oleaut32
VariantClear
VariantChangeType
VariantInit
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 179KB - Virtual size: 179KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE