t:\query\x86\ship\0\msqry32.pdb
Static task
static1
Behavioral task
behavioral1
Sample
68fffc26ebc0bfa3d62ca496919e9580_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
68fffc26ebc0bfa3d62ca496919e9580_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
68fffc26ebc0bfa3d62ca496919e9580
-
SHA1
bbcd9f4e11695097d1dcf9410ef7297e49bb30ce
-
SHA256
678cf072a25d97f47195b19db676a5a62c76231c9e4fa20d2e955929d6f702d1
-
SHA512
868517d47792c433b378b592b96a902157846c7e02e812608e33ce369ce3c6e7f1e44efc3c58e61dc272c05f04c9300f68f53922bf1e1b04b201d525e887ae66
-
SSDEEP
24576:ryhYW6oivxbvbVSLKCdFB2YuEWB/3wgQmlHMdIuwe3zfIe7xmvH/:r8YlbvbaNFwYG93wgjMdFrIe78vH/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 68fffc26ebc0bfa3d62ca496919e9580_NeikiAnalytics.exe
Files
-
68fffc26ebc0bfa3d62ca496919e9580_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
7d6e5c1fce1b943d82caa1a4ed9d358e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcr80
_configthreadlocale
memset
memcpy
memmove
exit
atoi
longjmp
_mbschr
atol
isalpha
isalnum
_mbsrchr
isdigit
floor
toupper
_memicmp
_localtime64_s
_time64
_splitpath_s
strcpy_s
_mbspbrk
iscntrl
_mbsnbcmp
_mbsstr
_makepath_s
remove
_getcwd
strchr
strrchr
wcspbrk
wcschr
memchr
strcspn
atof
isspace
_mbsnbicmp
_controlfp_s
_invoke_watson
_except_handler4_common
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_crt_debugger_hook
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_setjmp3
_initterm_e
_initterm
_acmdln
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
fopen_s
fwprintf_s
fclose
vsprintf_s
wcscpy_s
vswprintf_s
wcsrchr
tolower
kernel32
GlobalLock
GlobalAlloc
GlobalReAlloc
GlobalSize
FreeResource
SizeofResource
LockResource
LoadResource
FindResourceA
LocalAlloc
LocalFree
CreateFileA
lstrcmpA
GetFileAttributesA
GetProcAddress
GetModuleFileNameA
GetTempPathA
DeleteFileA
CloseHandle
GetCurrentDirectoryA
GetLocalTime
FindClose
FindNextFileA
FindFirstFileA
EnumResourceLanguagesA
WideCharToMultiByte
ReadFile
WriteFile
SetFilePointer
GlobalHandle
IsDBCSLeadByte
GetModuleHandleA
VirtualProtect
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetProcessHeap
GetModuleHandleW
CreateProcessA
GetTempFileNameA
HeapFree
HeapAlloc
LoadLibraryW
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLastError
GlobalFree
GlobalUnlock
GetCurrentThread
lstrlenA
MulDiv
MultiByteToWideChar
FreeLibrary
RaiseException
LoadLibraryA
FormatMessageA
GetSystemDirectoryW
LoadLibraryExW
GetTickCount
GetLocaleInfoA
GetCPInfo
SetErrorMode
GetSystemDefaultLangID
GetVersion
lstrcmpiA
GetACP
user32
CharLowerA
IsWindowVisible
SetDlgItemTextA
SendDlgItemMessageA
CheckDlgButton
IsDlgButtonChecked
GetDlgItemTextA
GetDlgItemInt
IsChild
GetDialogBaseUnits
GetDoubleClickTime
CreateDialogParamA
RegisterWindowMessageA
CheckRadioButton
ShowScrollBar
SetScrollInfo
GetScrollInfo
GetDlgCtrlID
GetWindowTextLengthA
GetLastActivePopup
WaitMessage
GetUpdateRect
GetMessageTime
ExcludeUpdateRgn
GetUpdateRgn
ValidateRect
IsRectEmpty
InvertRect
FrameRect
SetParent
RegisterClipboardFormatA
IsClipboardFormatAvailable
GetPriorityClipboardFormat
OpenClipboard
CloseClipboard
EmptyClipboard
GetClipboardFormatNameA
SetClipboardData
GetClipboardData
GetCaretPos
SetCaretPos
CreateCaret
DestroyCaret
BeginPaint
EndPaint
GetWindowDC
VkKeyScanA
SetClassLongA
DestroyCursor
EnumChildWindows
DeferWindowPos
EndDeferWindowPos
BeginDeferWindowPos
DdeCreateDataHandle
DdeGetData
DdeCmpStringHandles
DdeKeepStringHandle
GetForegroundWindow
DdeEnableCallback
DdeUninitialize
DdeInitializeA
DdeNameService
DdeClientTransaction
DdeDisconnect
DdeFreeStringHandle
DdeCreateStringHandleA
DdeConnect
DdeGetLastError
DdeQueryStringA
DrawTextA
LoadCursorA
DialogBoxIndirectParamA
GetDC
ReleaseDC
EnumThreadWindows
IsCharAlphaA
RemovePropA
SetPropA
TrackPopupMenu
InflateRect
ShowCaret
HideCaret
SetActiveWindow
InvalidateRgn
RegisterClassA
RegisterClassExA
GetClassInfoA
UnregisterClassA
CreateWindowExA
GetMenuItemID
EnableMenuItem
DrawMenuBar
GetSystemMenu
RemoveMenu
GetMenuStringA
GetSubMenu
LoadMenuA
ModifyMenuA
CheckMenuItem
DefMDIChildProcA
GetWindowPlacement
SetWindowPos
GetWindow
GetTopWindow
DeleteMenu
GetDlgItem
EndDialog
GetWindowTextA
SetWindowTextA
PostMessageA
IsWindow
LoadIconA
CreateMenu
AppendMenuA
SetMenu
DefFrameProcA
PostQuitMessage
SetWindowsHookExA
UnhookWindowsHookEx
GetMessagePos
GetMenu
GetMenuItemCount
ReplyMessage
IsDialogMessageA
TranslateMDISysAccel
IsZoomed
KillTimer
FlashWindow
EqualRect
DestroyMenu
GetSystemMetrics
LoadBitmapA
SetMessageQueue
MessageBoxA
CallNextHookEx
IsIconic
EnableWindow
GetActiveWindow
IsWindowEnabled
GetAsyncKeyState
SetFocus
InSendMessage
SetTimer
GetMessageA
TranslateMessage
DispatchMessageA
GetClassLongA
ShowWindow
SetCapture
SetRect
PeekMessageA
GetKeyState
ReleaseCapture
IsCharAlphaNumericA
FillRect
InvalidateRect
ClientToScreen
DdePostAdvise
DdeAccessData
DdeUnaccessData
SetForegroundWindow
InsertMenuA
DdeFreeDataHandle
GetPropA
DdeAddData
PtInRect
CallWindowProcA
CharUpperA
GetFocus
GetSysColor
DrawFocusRect
GetWindowRect
ScreenToClient
MoveWindow
SetWindowLongA
DefWindowProcA
DestroyWindow
GetScrollPos
SetScrollRange
GetWindowLongA
GetParent
BringWindowToTop
GetScrollRange
UpdateWindow
ScrollWindow
SetScrollPos
GetClientRect
IntersectRect
OffsetRect
ShowCursor
MessageBeep
GetCapture
GetCursorPos
WindowFromPoint
SetCursor
SendMessageA
GetClassInfoExA
gdi32
GetStockObject
CreateRectRgn
CombineRgn
GetObjectA
Rectangle
ExcludeClipRect
GetTextExtentPointA
GetTextMetricsA
GetTextColor
TextOutA
SelectObject
CreateFontIndirectA
GetCurrentObject
SetTextColor
RectVisible
InvertRgn
GetClipBox
GetNearestColor
StretchBlt
CreateCompatibleBitmap
Ellipse
GetBitmapBits
Polygon
CreatePolygonRgn
PtInRegion
RectInRegion
UnrealizeObject
CreateSolidBrush
StretchDIBits
GetDIBits
SelectPalette
GetTextExtentPoint32A
FillRgn
SetROP2
GetROP2
GetBkColor
SetRectRgn
OffsetRgn
GetCharWidthA
GetTextFaceA
SetBkMode
CreateCompatibleDC
DeleteDC
RestoreDC
SaveDC
SetMapMode
SetMapperFlags
GetViewportOrgEx
GetWindowExtEx
GetViewportExtEx
GetWindowOrgEx
CreateBitmap
CreatePen
RealizePalette
LineTo
PatBlt
BitBlt
GetDeviceCaps
DeleteObject
CreatePatternBrush
SetBkColor
CreateDIBitmap
ExtTextOutA
SetStretchBltMode
SetBrushOrgEx
MoveToEx
comctl32
PropertySheetA
comdlg32
GetOpenFileNameA
ChooseFontA
GetSaveFileNameA
CommDlgExtendedError
advapi32
RegQueryValueExW
RegEnumValueA
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyExW
ole32
OleUninitialize
BindMoniker
CoCreateInstance
OleInitialize
CoGetMalloc
StringFromGUID2
oleaut32
SysFreeString
SysAllocString
VariantChangeType
VariantClear
VariantInit
SysStringLen
shlwapi
wnsprintfA
odbc32
ord10
ord51
ord8
ord6
ord50
ord1
ord23
ord22
ord58
ord72
ord12
ord54
ord5
ord63
ord57
ord41
ord3
ord9
ord14
ord19
ord20
ord42
ord71
ord52
ord15
ord2
ord13
ord4
ord40
ord16
ord18
ord11
ord45
ord67
ord66
ord47
ord44
Sections
.text Size: 565KB - Virtual size: 565KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
QUIT_TEX Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
MAIN_TEX Size: 512B - Virtual size: 389B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT_TEX Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
ERROR_TE Size: 512B - Virtual size: 57B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DDEQT_TE Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DISPATCH Size: 512B - Virtual size: 66B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
GRINIT_T Size: 512B - Virtual size: 337B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 600KB - Virtual size: 604KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE