e:\work\guang\guang_r\[Client]Launcher1\Release\Launcher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6d72ada20df0cb4c9a575af5017cc5a0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6d72ada20df0cb4c9a575af5017cc5a0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
6d72ada20df0cb4c9a575af5017cc5a0_NeikiAnalytics.exe
-
Size
314KB
-
MD5
6d72ada20df0cb4c9a575af5017cc5a0
-
SHA1
60da219dfefa977277a455fdfa7169f43d56bf7c
-
SHA256
ab17f15b207d1c37a98a9ddcc01a95e47e7363da61b5e4a1c2624f7bf93e0ea6
-
SHA512
4c6ef204c905e0ae12ecfdc576be27ad24ba94832def8233d3c67cb73b2bbdbcaa46aef413561c74392476e5239d5a93738e5717835af2b88b3a21ba92f07ef0
-
SSDEEP
6144:45K5LiOe8Hl2V37LO5Uf58e25EXjRysQqzvTx5d5HSB:45AHl2V37aux92SXjPr5Hk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6d72ada20df0cb4c9a575af5017cc5a0_NeikiAnalytics.exe
Files
-
6d72ada20df0cb4c9a575af5017cc5a0_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
eb6eed251f6bd589e2f303b88418733b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc90
ord5997
ord662
ord398
ord4952
ord4029
ord7118
ord7312
ord4197
ord1098
ord7098
ord6462
ord2447
ord9252
ord4890
ord3110
ord6001
ord5646
ord5663
ord4981
ord4333
ord5659
ord5657
ord3209
ord2087
ord4199
ord5813
ord6721
ord5533
ord1046
ord4165
ord6018
ord2206
ord2251
ord3643
ord6781
ord4159
ord6783
ord4409
ord4434
ord9945
ord7746
ord12597
ord12145
ord13116
ord10284
ord10437
ord9952
ord13174
ord12384
ord6395
ord403
ord663
ord6793
ord1555
ord441
ord690
ord404
ord3718
ord5544
ord5520
ord3179
ord5720
ord5716
ord1559
ord6670
ord1607
ord4646
ord1720
ord2283
ord3480
ord2274
ord611
ord3478
ord4638
ord1668
ord2273
ord3477
ord3534
ord2106
ord2539
ord1183
ord750
ord3617
ord1710
ord1779
ord1252
ord820
ord310
ord300
ord601
ord1254
ord1258
ord316
ord4281
ord3346
ord6391
ord1497
ord5647
ord3277
ord3940
ord796
ord595
ord1746
ord636
ord367
ord2069
ord1490
ord4516
ord4513
ord4993
ord1137
ord639
ord374
ord3987
ord3783
ord5615
ord4617
ord5152
ord5309
ord2208
ord1810
ord1809
ord1678
ord3344
ord6388
ord1755
ord1752
ord4331
ord1496
ord4650
ord5585
ord2074
ord5497
ord6780
ord4589
ord5636
ord3732
ord5139
ord4688
ord1729
ord6446
ord5668
ord5666
ord958
ord963
ord967
ord965
ord969
ord2610
ord2630
ord2614
ord2620
ord2618
ord2616
ord2633
ord2628
ord2612
ord2635
ord2623
ord2605
ord2607
ord1603
ord1041
ord1042
ord3175
ord782
ord581
ord1568
ord5776
ord5528
ord780
ord579
ord615
ord3487
ord4640
ord1670
ord2277
ord4496
ord1604
ord2103
ord4727
ord2592
ord5924
ord2481
ord4507
ord6170
ord5167
ord744
ord524
ord1100
ord2625
ord2375
ord2368
ord1644
ord6784
ord4160
ord6782
ord3671
ord5389
ord6356
ord3218
ord1446
ord5608
ord2139
ord1792
ord1791
ord1728
ord5633
ord2766
ord2978
ord3107
ord2899
ord6584
ord4412
ord305
ord3213
ord4714
ord2961
ord1611
ord817
ord3135
ord2769
ord941
ord265
ord6559
ord4667
ord6815
ord2888
ord2759
ord4066
ord4067
ord4057
ord2886
ord4334
ord4895
ord4668
ord1062
ord6740
ord1938
ord1108
ord777
ord798
ord1276
ord4733
ord800
msvcr90
_CxxThrowException
memset
_setmbcp
memcpy
_controlfp_s
_invoke_watson
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
_invalid_parameter_noinfo
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABV01@@Z
atoi
_mbsicmp
_mbstok
sprintf
_recalloc
free
calloc
_purecall
__CxxFrameHandler3
kernel32
WaitForSingleObject
lstrlenA
MultiByteToWideChar
GetModuleFileNameW
GetLastError
CreateMutexA
GlobalUnlock
GlobalLock
GlobalAlloc
LoadResource
SizeofResource
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
FindResourceA
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
CreateDirectoryA
GlobalFree
WriteFile
CloseHandle
ReadFile
CreateFileA
Sleep
GetCurrentProcess
DeleteFileA
GetModuleFileNameA
GetProcAddress
LoadLibraryA
TerminateThread
user32
ReleaseDC
GetDC
SetWindowPos
GetWindowRect
MessageBoxA
IsWindowVisible
EnableWindow
GetParent
SetLayeredWindowAttributes
UnhookWindowsHookEx
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
wsprintfA
LoadIconA
SendMessageA
UpdateLayeredWindow
gdi32
SelectObject
CreateDIBSection
DeleteDC
DeleteObject
GetStockObject
CreateCompatibleBitmap
CreateSolidBrush
CreateCompatibleDC
shell32
ShellExecuteA
comctl32
InitCommonControlsEx
shlwapi
PathFileExistsA
ole32
CreateStreamOnHGlobal
gdiplus
GdiplusStartup
GdipLoadImageFromFile
GdipReleaseDC
GdipDrawImageRectI
GdipSetSmoothingMode
GdipDeleteGraphics
GdipCreateFromHDC
GdipGetImageWidth
GdipGetImageHeight
GdipDisposeImage
GdipCloneImage
GdipAlloc
GdipFree
GdipLoadImageFromStream
GdiplusShutdown
msvcp90
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
version
GetFileVersionInfoW
VerQueryValueA
GetFileVersionInfoSizeW
wininet
InternetCloseHandle
Sections
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 253KB - Virtual size: 253KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ