c:\build\clients2\sc\sda\Release\PGPsda.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3a486791bb882cda5bd6147e13dc5590_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3a486791bb882cda5bd6147e13dc5590_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
3a486791bb882cda5bd6147e13dc5590_NeikiAnalytics.exe
-
Size
190KB
-
MD5
3a486791bb882cda5bd6147e13dc5590
-
SHA1
ec4eae845784a2599114d175957dd2d0e9b78681
-
SHA256
5694d337958f9fabbb6af2126ffee69d1fc30cc05b21e93e50e6793b33a2a07c
-
SHA512
3b8f3654198d72d4b620d721159fb944a52c056952175a4ab3b504390bd338d383d4e2a47fea8fc65d8674634f455698c8646a34c2deea13a2ea4349ce6db458
-
SSDEEP
3072:SNSyprKqUxEa5uTjw8Sta/z0gskV8c7Jcjzuc9f3bI3l8QhZhIO4n0MAIQhxBln+:wjKjn470Tk6c7JcjX9ehZhIO4n0MAIQC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a486791bb882cda5bd6147e13dc5590_NeikiAnalytics.exe
Files
-
3a486791bb882cda5bd6147e13dc5590_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
c33d1a7c6d9cb38a8f96080ca1e3ed89
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ord17
kernel32
HeapSize
SetEndOfFile
GetSystemInfo
VirtualProtect
GetLocaleInfoA
CreateFileW
InitializeCriticalSection
VirtualQuery
InterlockedExchange
RtlUnwind
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStringTypeW
GetStringTypeA
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
GetCPInfo
GetOEMCP
LCMapStringW
MultiByteToWideChar
WideCharToMultiByte
LCMapStringA
FlushFileBuffers
WriteFile
SetStdHandle
GetFileType
GetStdHandle
SetHandleCount
VirtualAlloc
DeleteCriticalSection
VirtualFree
HeapCreate
IsDBCSLeadByteEx
MulDiv
CreateFileA
DeleteFileA
GetFileAttributesA
CreateSemaphoreA
WaitForSingleObject
CloseHandle
CreateThread
lstrcpyA
ReleaseSemaphore
GetProcAddress
FreeLibrary
GetVersionExA
HeapDestroy
LeaveCriticalSection
GetACP
lstrlenA
LoadLibraryA
GetModuleFileNameA
ReadFile
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
ExitProcess
HeapFree
GetLastError
SetFilePointer
HeapAlloc
HeapReAlloc
CreateDirectoryW
CreateDirectoryA
DeleteFileW
RemoveDirectoryW
RemoveDirectoryA
GetSystemTimeAsFileTime
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
QueryPerformanceCounter
EnterCriticalSection
user32
GetKeyState
RegisterClassA
LoadStringA
MessageBoxW
MessageBoxA
SetWindowPos
GetSystemMetrics
GetWindowRect
DefWindowProcA
UpdateWindow
ShowWindow
SetWindowLongW
GetFocus
GetClientRect
CallWindowProcW
SetCaretPos
DestroyCaret
CreateCaret
ShowCaret
GetWindow
FillRect
GetParent
KillTimer
IsDlgButtonChecked
CheckDlgButton
LoadIconA
SetFocus
CreateWindowExA
GetKeyboardLayout
DialogBoxParamA
EndDialog
IsWindowEnabled
SetForegroundWindow
SetTimer
GetDlgItem
MapWindowPoints
SetWindowTextA
SendDlgItemMessageA
ActivateKeyboardLayout
SendMessageA
GetDC
ReleaseDC
SetWindowLongA
SystemParametersInfoA
GetWindowTextA
GetWindowLongA
CallWindowProcA
IsWindowVisible
BeginPaint
DrawIcon
GetSysColor
EndPaint
InvalidateRect
gdi32
DeleteDC
GetTextMetricsA
CreateCompatibleDC
CreateCompatibleBitmap
GetStockObject
GetObjectA
GetDeviceCaps
GetTextExtentPoint32W
ExtTextOutW
BitBlt
SetBkMode
TextOutW
TranslateCharsetInfo
DeleteObject
CreateSolidBrush
CreatePen
CreateFontIndirectA
SelectObject
SetTextColor
SetBkColor
Rectangle
ExtTextOutA
comdlg32
GetSaveFileNameA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ