D:\a\_work\1\s\bin\Release\CoreDebugger\x86\VsDebugLaunchNotify.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4932e451c4922146c00bbfa5316b8be0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4932e451c4922146c00bbfa5316b8be0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
4932e451c4922146c00bbfa5316b8be0_NeikiAnalytics.exe
-
Size
584KB
-
MD5
4932e451c4922146c00bbfa5316b8be0
-
SHA1
b77d297d4d87d1cf8f04e3096c18ef14f86d01a9
-
SHA256
dfc0818c9a013d50e10ded55da92632880a6e9c329b4a24acfc8c921dec50444
-
SHA512
32a660f84bd7cc194ce983f423838608fba1a1e2eef77203f0d132f56d2abfc49fc5d1811fd5b8b2b63e1723cfaf92c64fb5be54a7babb4a73c69bbd1ac11677
-
SSDEEP
12288:Aia/bxXyGH7XR2CAwEQki1I7wwY8DMkw5V7iP3sOZ9jDH3kTKE/aoJut8o2kL:FaF3B7zPkcowwtdwKzDXkDNJ4D2k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4932e451c4922146c00bbfa5316b8be0_NeikiAnalytics.exe
Files
-
4932e451c4922146c00bbfa5316b8be0_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
fe17a95920e5eaaf44266885de7d5dd4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
vcruntime140
__CxxFrameHandler3
_CxxThrowException
_except_handler4_common
memset
__current_exception_context
__current_exception
wcschr
memcpy
api-ms-win-crt-string-l1-1-0
wcscpy_s
wcsncmp
wcsnlen
api-ms-win-crt-convert-l1-1-0
wcstoul
_wtoi
api-ms-win-crt-heap-l1-1-0
_set_new_mode
free
api-ms-win-crt-runtime-l1-1-0
_invalid_parameter_noinfo
_initialize_narrow_environment
_configure_narrow_argv
_controlfp_s
terminate
_register_onexit_function
_errno
_register_thread_local_exe_atexit_callback
_c_exit
_exit
exit
_initterm_e
_initterm
_get_narrow_winmain_command_line
_initialize_onexit_table
_set_app_type
_seh_filter_exe
_cexit
_crt_atexit
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
kernel32
QueryPerformanceCounter
GetCurrentThreadId
GetStartupInfoW
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
GetProcessHeap
GetModuleHandleW
WaitNamedPipeW
IsDebuggerPresent
IsProcessorFeaturePresent
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LCMapStringW
GetEnvironmentVariableW
Sleep
GetProcAddress
OpenThread
HeapDestroy
SetNamedPipeHandleState
HeapFree
GetCommandLineW
TerminateProcess
GetModuleFileNameW
WaitForMultipleObjects
CreateFileW
SuspendThread
ResumeThread
OpenProcess
HeapSize
GetLastError
HeapReAlloc
CloseHandle
HeapSetInformation
HeapAlloc
TransactNamedPipe
ole32
StringFromGUID2
CLSIDFromString
oleaut32
SysAllocStringLen
SysFreeString
SysAllocString
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1012B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE