iedw.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3654e66e64fc92aa0242c7c12c90f570_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3654e66e64fc92aa0242c7c12c90f570_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
3654e66e64fc92aa0242c7c12c90f570_NeikiAnalytics.exe
-
Size
45KB
-
MD5
3654e66e64fc92aa0242c7c12c90f570
-
SHA1
2c7fc60fcf5ecf814aa9d20a95cebecf45f68223
-
SHA256
16a9b55eaae6ad5b169da16c3505ccaa711aceb392ffeb6ac4bb90d5e68ca031
-
SHA512
cbba95cbfc1517ed8d8e4ca853336f2785c5b753ba2d352428f001bebe503c9e2edd9f5935d1ac3bf404ccf4d4d56bd24f45118b6e9738f2bd55bac2d9321e59
-
SSDEEP
768:ZKf92VRifbTf+3/WQ9FKZ1sH8zof4ByN2d8v9Bz7:Y1nfbTm+Q9Fqab4BJSv9Bz7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3654e66e64fc92aa0242c7c12c90f570_NeikiAnalytics.exe
Files
-
3654e66e64fc92aa0242c7c12c90f570_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
604048d0e71c3ca535c066860ec8d6d2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
??2@YAPAXI@Z
_except_handler3
_c_exit
_exit
_XcptFilter
_cexit
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_vsnwprintf
__set_app_type
_controlfp
??3@YAXPAX@Z
kernel32
EnterCriticalSection
LoadLibraryExA
SetEvent
GetTempFileNameW
GetTickCount
GetTempPathW
UnmapViewOfFile
GetModuleHandleW
CloseHandle
CreateProcessW
GetModuleFileNameW
GetLastError
SetLastError
DeleteCriticalSection
lstrcpynW
CreateFileW
GetCommandLineW
SetUnhandledExceptionFilter
InitializeCriticalSection
CreateFileMappingW
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleHandleA
GetStartupInfoA
GetProcAddress
LeaveCriticalSection
LocalFree
LoadLibraryW
MapViewOfFile
GetWindowsDirectoryW
GlobalFree
gdi32
GetObjectW
SetTextColor
SetBkMode
CreatePen
SelectObject
Polyline
DeleteObject
CreateFontIndirectW
user32
GetParent
DialogBoxParamW
SendMessageW
LoadStringW
SetDlgItemTextW
GetSysColor
DrawIconEx
FillRect
GetSysColorBrush
SetWindowTextW
EnableWindow
GetDlgItem
SetWindowPos
ShowWindow
EndDialog
MessageBoxW
SetWindowLongW
GetWindowLongW
shlwapi
ord414
PathFindFileNameW
PathRemoveFileSpecW
PathAppendW
PathQuoteSpacesW
StrCmpW
StrToIntW
shell32
ExtractIconExW
CommandLineToArgvW
dbghelp
MiniDumpWriteDump
MiniDumpReadDumpStream
oleaut32
SysStringLen
SysAllocStringLen
SysFreeString
SysAllocString
ole32
CoInitialize
CoUninitialize
CoCreateInstance
shdocvw
ord159
sfc
SfcIsFileProtected
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE