espexe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
64e65636be3a255c3d52e0e0d0dfc0d0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
64e65636be3a255c3d52e0e0d0dfc0d0_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
64e65636be3a255c3d52e0e0d0dfc0d0
-
SHA1
58f95419466c95720f150ec66a5bdc50b6a775d9
-
SHA256
1844630f5ae308830873dbe3ac840ded444910b6369d6899d7315f7e1e8f7ecd
-
SHA512
fed88ae3c97d42df0629981b0cfa16a1a65686bc497fba09b42185fc5d82b169f18deec2b7e02b32773fbe896b7edf32ff611ccc9233f363887b38aa1cd717e4
-
SSDEEP
12288:iC7h08Qw+Xq1gYgR+8DAoczI2ZfnwlQTePINayz+ByIne7xmmZjIUTSl+0/1:iC7hoJMdIuwe3zfIe7xmvH/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 64e65636be3a255c3d52e0e0d0dfc0d0_NeikiAnalytics.exe
Files
-
64e65636be3a255c3d52e0e0d0dfc0d0_NeikiAnalytics.exe.exe windows:10 windows x86 arch:x86
08f8f762932c1554a5e68ab3209f7544
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateThread
SetThreadPriority
ExitThread
FreeLibrary
GetProcAddress
GetCurrentProcessId
LocalAlloc
LocalFree
GetProfileIntA
GetProfileStringA
WriteProfileStringA
GetCurrentProcess
WaitForMultipleObjects
CreateEventA
WaitForSingleObject
HeapSetInformation
GetLastError
LoadLibraryExW
CloseHandle
UnhandledExceptionFilter
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
GetStartupInfoW
Sleep
TerminateProcess
gdi32
SetBkColor
LineTo
GetStockObject
DeleteObject
CreateFontA
MoveToEx
user32
GetFocus
SetCapture
ReleaseCapture
EnableWindow
LoadAcceleratorsA
DestroyAcceleratorTable
TranslateAcceleratorA
GetSystemMetrics
GetMenu
CheckMenuItem
EnableMenuItem
DrawIcon
BeginPaint
EndPaint
IsIconic
SetWindowTextA
GetWindowTextA
GetWindowTextLengthA
GetClientRect
SendDlgItemMessageA
MessageBoxA
SetCursor
GetCursorPos
MapWindowPoints
FillRect
GetClassNameA
GetWindow
LoadCursorA
LoadIconA
DestroyIcon
GetDlgItemTextA
GetMessageA
InvalidateRect
TranslateMessage
DispatchMessageA
SendMessageA
PostMessageA
PostQuitMessage
DestroyWindow
ShowWindow
SetWindowPos
SetFocus
SetDlgItemTextA
GetDlgItem
EndDialog
DialogBoxParamA
GetWindowRect
CreateDialogParamA
msvcrt
_controlfp
?terminate@@YAXXZ
_except_handler4_common
_acmdln
_initterm
__setusermatherr
_ismbblead
__p__fmode
_cexit
_exit
exit
__set_app_type
__getmainargs
_amsg_exit
__p__commode
_XcptFilter
_vsnprintf
_stricmp
strstr
rpcrt4
RpcStringFreeA
I_RpcExceptionFilter
NdrClientCall2
RpcStringBindingComposeA
RpcBindingFree
RpcBindingFromStringBindingA
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE