t:\clview\x86\ship\0\clview.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3526bd9b664828b213c30144bc6e2200_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3526bd9b664828b213c30144bc6e2200_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
3526bd9b664828b213c30144bc6e2200_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
3526bd9b664828b213c30144bc6e2200
-
SHA1
2c2d75caa8cd60a5f3ce9952da8b7bb36ea7ba88
-
SHA256
ab3ed3563f9c31ac288fb6d8a5a1b20594f0c582e761da5e4c8c0633ccc22411
-
SHA512
badf5ae98c70cb373a962774e6feb7fbaf9e04d71c0dc3f1506ba2d52b6246f8d32f28da737ca07fd990c5b5146930c414dac17deea9eec488ac372f9b8382d4
-
SSDEEP
12288:F0H4KiIQ2sl4+lCFcD1goThydrWUeB+QChZsrwbebPeVmfCUqVfZbdbHF:OYKiICl4UOoTqy8QCYrLLeYKUML
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3526bd9b664828b213c30144bc6e2200_NeikiAnalytics.exe
Files
-
3526bd9b664828b213c30144bc6e2200_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
b525b133652cd0240e3f916da9fb0c1f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
CreateSolidBrush
DeleteObject
kernel32
RaiseException
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
GetCurrentProcess
GetCurrentThreadId
SetLastError
MulDiv
GetCommandLineW
FreeLibrary
InitializeCriticalSection
DeleteCriticalSection
lstrlenW
GetLastError
lstrcmpiW
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleHandleW
GetModuleFileNameW
DeleteFileW
MoveFileExW
CloseHandle
WriteFile
ReadFile
GetFileSize
GlobalUnlock
GlobalLock
GlobalAlloc
GetUserDefaultLCID
lstrlenA
GetTempFileNameW
GetTempPathW
CreateThread
FindClose
FindFirstFileW
GetLongPathNameW
WaitForSingleObject
ReleaseMutex
CreateMutexW
WideCharToMultiByte
CreateProcessW
ProcessIdToSessionId
GetCurrentProcessId
LocalAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
LoadLibraryW
GetTempPathA
GetTempFileNameA
CreateProcessA
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
VirtualProtect
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcAddress
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
Sleep
TlsGetValue
user32
GetMenuStringW
GetCursorPos
FrameRect
AdjustWindowRect
InflateRect
ModifyMenuW
FindWindowExW
GetClassNameW
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
CreatePopupMenu
MessageBeep
AppendMenuW
KillTimer
TrackPopupMenu
CharNextW
GetKeyState
SetWindowLongW
GetWindowLongW
CallWindowProcW
SendMessageW
GetClientRect
ShowWindow
GetClassInfoExW
LoadCursorW
DefWindowProcW
SetTimer
MapVirtualKeyW
DestroyIcon
GetWindowPlacement
SetWindowPlacement
SetWindowTextW
MessageBoxW
PostMessageW
GetSystemMetrics
GetTopWindow
GetForegroundWindow
BringWindowToTop
GetWindow
EnumWindows
SendMessageTimeoutW
GetParent
MonitorFromWindow
GetMonitorInfoW
SetWindowPos
SystemParametersInfoW
IsWindowVisible
GetWindowRect
LoadIconW
MapWindowPoints
CopyRect
DestroyWindow
CreateWindowExW
RegisterClassExW
UnregisterClassA
msocf
?CreateTheApp@Frame@MsoCF@@YGXAAUCreateTheAppArgs@12@@Z
?TheApp@Frame@MsoCF@@YGPAUAFrameApp@2@XZ
?TerminateTheApp@Frame@MsoCF@@YGXXZ
?Finish@Frame@MsoCF@@YGXXZ
?Finish@Utilities@MsoCF@@YGXXZ
??0CToolbarData@MsoCF@@QAE@XZ
?Init@CToolbarData@MsoCF@@QAGXPBUStaticToolbarDesc@2@IPBUStaticMenuDesc@2@I@Z
?g_FixedBufferAllocator@MsoCF@@3VCFixedBufferAllocator@1@A
?SetWzFromNumber@Strings@MsoCF@@YGXAAV?$CWzInBuffer_T@V?$String@UWzTraits@MsoCF@@@MsoCF@@V?$CBuffer@_W@2@@2@IHHPAH@Z
?g_FastBufferAllocator@MsoCF@@3VCFastBufferAllocator@1@A
?AppendArrayOfCharactersToWz@Strings@MsoCF@@YGXPB_WHAAV?$CWzInBuffer_T@V?$String@UWzTraits@MsoCF@@@MsoCF@@V?$CBuffer@_W@2@@2@PAH@Z
?SetWzFromResource@Strings@MsoCF@@YGXAAV?$CWzInBuffer_T@V?$String@UWzTraits@MsoCF@@@MsoCF@@V?$CBuffer@_W@2@@2@PAUHINSTANCE__@@IPAH@Z
?CreateActionManager@MsoCF@@YGXPAPAUIActionManager@1@@Z
??1CToolbarData@MsoCF@@QAE@XZ
?Start@Utilities@MsoCF@@YGXHPAU_msotcfcf@@@Z
?Start@Frame@MsoCF@@YGXXZ
?SetWtzFromPattern@Strings@MsoCF@@YGXAAV?$CWtzInBuffer_Template@V?$CBuffer@_W@MsoCF@@@2@PAUHINSTANCE__@@IQAPB_WH@Z
?SetWzFromPattern@Strings@MsoCF@@YGXAAV?$CWzInBuffer_T@V?$String@UWzTraits@MsoCF@@@MsoCF@@V?$CBuffer@_W@2@@2@PAUHINSTANCE__@@IQAPB_WHPAH@Z
?Free@Allocator@Memory@MsoCF@@YGXPAX@Z
?TheActionManager@MsoCF@@YGPAUIActionManager@1@XZ
?Set@Properties@MsoCF@@YGXPAUIPropertySet@2@ABUPropertyInfo@2@PBXW4PropertyType@2@@Z
?LookupProperty@MsoCF@@YGABUPropertyInfo@1@I@Z
?FGet@Properties@MsoCF@@YG_NPAUIPropertySet@2@PBUPropertyInfo@2@PAXHW4PropertyType@2@@Z
?FreeAndZero_ComplexType@CPropertyData@MsoCF@@SGXPAXW4PropertyType@2@@Z
?ProduceAtom@MsoCF@@YGXPAPAVIAtom@1@PBXH@Z
?GetProperty@IPropertySet@MsoCF@@QAGXABUPropertyInfo@2@PAVCPropertyValue@2@@Z
?RegisterPropertySpace@MsoCF@@YGXPBUPropertySpaceInfo@1@@Z
msvcr80
_onexit
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_controlfp_s
_invoke_watson
_crt_debugger_hook
_except_handler4_common
_decode_pointer
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
??3@YAXPAX@Z
??_V@YAXPAX@Z
__CxxFrameHandler3
_CxxThrowException
??_U@YAPAXI@Z
swprintf_s
memset
_recalloc
??2@YAPAXI@Z
malloc
free
memcpy_s
wcsncpy_s
_vsnprintf
_vsnwprintf
memcpy
_wtoi
_wcsdup
_wtol
vswprintf_s
wcsrchr
wcscpy_s
vsprintf_s
fclose
fwprintf_s
fopen_s
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
oleaut32
VariantInit
SysFreeString
VarUI4FromStr
SysAllocString
VariantClear
shlwapi
PathCreateFromUrlW
AssocQueryStringW
shell32
CommandLineToArgvW
SHFileOperationW
wininet
InternetErrorDlg
HttpQueryInfoW
InternetOpenW
InternetReadFile
InternetCloseHandle
InternetOpenUrlW
urlmon
URLDownloadToFileW
ObtainUserAgentString
Sections
.text Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.1MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE