xaudio2_2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3bdd23a1fe1eeea0729cb9f19a57c850_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3bdd23a1fe1eeea0729cb9f19a57c850_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
3bdd23a1fe1eeea0729cb9f19a57c850_NeikiAnalytics.exe
-
Size
771KB
-
MD5
3bdd23a1fe1eeea0729cb9f19a57c850
-
SHA1
189ad3be61b1f82d23944aa8751d329142f33a84
-
SHA256
8883c8710f8b93d519376033f07b8c63c7a5007eb3c3acd94cc47240b2308cbe
-
SHA512
1eb7cc46f5a681528441b6de0c0b198def7617f081bf89d08a0303bd848a69aea577c2719e3c06346583473d79ebcb6e8a6e802dc0999b5168cc9f51f761a287
-
SSDEEP
12288:LSsPDCbslC9Obfax1Y4o2K6hJfceNpjSL5TjTQMc/KS4Zr8z01Q+lmQ:L3Cdr1Y4oyJEeNwPEMNj201Q+EQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3bdd23a1fe1eeea0729cb9f19a57c850_NeikiAnalytics.exe
Files
-
3bdd23a1fe1eeea0729cb9f19a57c850_NeikiAnalytics.exe.dll regsvr32 windows:6 windows x86 arch:x86
d64fba2866e10d811cc8e8858bc2dc78
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
memset
_CIpow
_control87
_adjust_fdiv
_amsg_exit
_initterm
free
malloc
_XcptFilter
ceil
strlen
_purecall
memmove
_vsnprintf
memcmp
memcpy
strcmp
wcslen
_vsnwprintf
_aligned_malloc
_aligned_free
sin
cos
floor
sqrt
kernel32
GetSystemInfo
WaitForMultipleObjects
DuplicateHandle
CreateThread
GetProcessAffinityMask
SetThreadAffinityMask
SetThreadPriority
ResumeThread
CloseHandle
ResetEvent
SetEvent
SwitchToThread
WaitForSingleObject
CreateEventA
LoadLibraryA
GetProcAddress
HeapSize
GetProcessHeap
lstrcmpW
ReleaseSemaphore
GetVersionExA
GetVersion
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
RtlUnwind
InterlockedCompareExchange
Sleep
InterlockedExchange
DisableThreadLibraryCalls
CreateSemaphoreA
WaitForSingleObjectEx
FreeLibrary
GetModuleFileNameA
GetCurrentThreadId
HeapDestroy
DeleteCriticalSection
InitializeCriticalSection
HeapCreate
QueryPerformanceFrequency
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
HeapFree
GetLastError
OutputDebugStringA
InterlockedIncrement
InterlockedDecrement
IsProcessorFeaturePresent
DebugBreak
ole32
PropVariantClear
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CLSIDFromString
user32
MessageBoxA
GetDesktopWindow
rpcrt4
UuidToStringA
RpcStringFreeA
advapi32
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
winmm
timeBeginPeriod
timeEndPeriod
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 469KB - Virtual size: 469KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.no_bbt Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 297KB - Virtual size: 300KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ