ntvdm.pdb
Static task
static1
Behavioral task
behavioral1
Sample
84f8daecffc7d8d835b21df74cadd210_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
84f8daecffc7d8d835b21df74cadd210_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
84f8daecffc7d8d835b21df74cadd210_NeikiAnalytics.exe
-
Size
541KB
-
MD5
84f8daecffc7d8d835b21df74cadd210
-
SHA1
43443d2b5a5133cbd3d91b2da697e619224e20d1
-
SHA256
8cd2ba3bd7568ab1eeb5abfe84032978cb724a37ec61fe317a290e199ac72ba8
-
SHA512
c13ce95873f8e38fe9314815ee2238d0467eda9d020112a7edbb0b3ff30e99fa586cb52949db4da9a9fe2dac4858d3dc552c3645f0f6fb08df4487122280b881
-
SSDEEP
6144:afWe5qFsV6imwU9bJwy/4BYHIBL+rW0rJyRox0D7lBe+blM7z0ruzfgoZNL2qoxH:8VMq6iiPiYhVxs7lQ+i9goZciJ0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 84f8daecffc7d8d835b21df74cadd210_NeikiAnalytics.exe
Files
-
84f8daecffc7d8d835b21df74cadd210_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
0de8ef8c76db9e2bdc215cc7ab7afb78
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
EnterCriticalSection
LeaveCriticalSection
SetUnhandledExceptionFilter
GetProcAddress
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetCurrentThread
HeapDestroy
HeapCreate
VirtualFree
HeapFree
VirtualAlloc
HeapReAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
HeapAlloc
GetVersionExA
GetOEMCP
OutputDebugStringA
RtlUnwind
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExA
InitializeCriticalSection
Sleep
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
ReadFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
VirtualProtect
GetSystemInfo
VirtualQuery
SetFilePointer
SetStdHandle
CloseHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetCPInfo
QueryPerformanceCounter
GetConsoleKeyboardLayoutNameA
SetVDMCurrentDirectories
GetCommandLineA
HeapSetInformation
GetTickCount
GetACP
DebugBreak
GetLocalTime
WaitForSingleObjectEx
ExitThread
SetEvent
WaitForSingleObject
CreateEventA
SetThreadPriority
CreateThread
RaiseException
FormatMessageA
FindClose
FindFirstFileA
GetFileSize
GetSystemWindowsDirectoryA
SetPriorityClass
GetPriorityClass
GetSystemDefaultLangID
SetErrorMode
ResetEvent
ResumeThread
DuplicateHandle
GetSystemDirectoryA
ClearCommError
GetOverlappedResult
SetCommState
WaitForMultipleObjects
EscapeCommFunction
ClearCommBreak
SetCommBreak
SetCommTimeouts
GetCommTimeouts
SetupComm
GetCommState
SetConsoleDisplayMode
GetConsoleDisplayMode
GetThreadContext
SetCurrentDirectoryA
SetEnvironmentVariableA
SetConsoleTitleA
GetConsoleTitleA
ReadConsoleOutputA
SetConsoleCursorPosition
GetConsoleCursorInfo
GetConsoleScreenBufferInfo
SetConsoleCursorInfo
WriteConsoleOutputA
SetConsoleWindowInfo
SetConsoleScreenBufferSize
SetConsoleMode
Beep
SetConsoleActiveScreenBuffer
FillConsoleOutputAttribute
FillConsoleOutputCharacterA
GetConsoleFontSize
GetCurrentConsoleFont
CreateConsoleScreenBuffer
DeviceIoControl
ReleaseMutex
CreateProcessA
CreateMutexA
_lread
_lclose
_llseek
_lopen
GetFileAttributesA
GetWindowsDirectoryA
LoadLibraryA
IsDebuggerPresent
LocalFree
LocalAlloc
GetDriveTypeA
CreateSemaphoreA
ReleaseSemaphore
FileTimeToDosDateTime
FileTimeToLocalFileTime
QueryDosDeviceW
GetShortPathNameW
IsDBCSLeadByte
GetFileAttributesW
DefineDosDeviceW
FindNextFileW
FindFirstFileW
CreateDirectoryW
RemoveDirectoryW
MoveFileW
LocalFileTimeToFileTime
GetDriveTypeW
GetFileTime
SetFileTime
SystemTimeToFileTime
GetSystemTime
DeleteFileW
GetFileInformationByHandle
CreateFileW
CompareStringW
GetVolumeInformationW
GetCompressedFileSizeW
SetFileAttributesW
SetEndOfFile
SetLocalTime
UnlockFile
LockFile
GetTempPathW
GetEnvironmentVariableA
CreateDirectoryA
GetShortPathNameA
lstrlenA
GetFileAttributesExA
ExpandEnvironmentStringsA
DeleteFileA
GetTempPathA
TerminateThread
GetTempFileNameA
SetConsoleOutputCP
SetConsoleCP
SearchPathA
GetBinaryTypeA
GetExitCodeProcess
SearchPathW
GetTempFileNameW
SetVolumeLabelW
MoveFileExW
GetDiskFreeSpaceW
GetComputerNameW
GlobalMemoryStatus
VirtualUnlock
GetNextVDMCommand
ExitVDM
SetConsoleKeyShortcuts
GetConsoleHardwareState
SetConsoleHardwareState
RegisterConsoleVDM
SetConsolePalette
ConsoleMenuControl
ShowConsoleCursor
VDMConsoleOperation
WriteConsoleInputVDMW
ReadConsoleInputExW
GetConsoleInputWaitHandle
SetLastConsoleEventActive
InvalidateConsoleDIBits
GetProcessHeap
ntdll
NtQueryInformationProcess
RtlUnicodeStringToAnsiString
NtClose
RtlInitUnicodeString
NtEnumerateValueKey
NtOpenKey
RtlTimeToTimeFields
RtlTimeFieldsToTime
NtAlertThread
NtQueryPerformanceCounter
RtlExtendedLargeIntegerDivide
NtWaitForMultipleObjects
RtlExtendedIntegerMultiply
RtlLeaveCriticalSection
RtlEnterCriticalSection
NtTerminateProcess
RtlInitializeCriticalSection
NtVdmControl
RtlUnicodeStringToOemString
RtlAnsiStringToUnicodeString
RtlInitString
RtlOemStringToUnicodeString
RtlFreeUnicodeString
NtRaiseHardError
RtlInitAnsiString
RtlNtStatusToDosError
LdrLoadDll
NtAllocateVirtualMemory
NtCreateFile
NtDeviceIoControlFile
RtlFillMemoryUlong
NtOpenFile
NtQueryInformationFile
NtFsControlFile
NtWaitForSingleObject
NtMapViewOfSection
NtUnmapViewOfSection
NtFreeVirtualMemory
NtCreateSection
LdrUnloadDll
RtlOemToUnicodeN
NtGetContextThread
NtQueryInformationThread
NtDuplicateObject
NtSetContextThread
DbgPrint
DbgPrompt
NtSetInformationFile
RtlEqualUnicodeString
NtQuerySymbolicLinkObject
NtOpenSymbolicLinkObject
RtlAppendUnicodeToString
RtlFreeAnsiString
NtQueryObject
NtQueryVolumeInformationFile
RtlFreeHeap
NtQueryDirectoryFile
RtlCompareUnicodeString
RtlUpcaseUnicodeStringToCountedOemString
RtlIsNameLegalDOS8Dot3
RtlIsDosDeviceName_U
RtlAllocateHeap
RtlCreateUnicodeString
RtlDosPathNameToNtPathName_U
RtlUnicodeStringToCountedOemString
RtlUpcaseUnicodeChar
RtlGetFullPathName_U
RtlDetermineDosPathNameType_U
RtlReAllocateHeap
RtlReleaseRelativeName
RtlDosPathNameToRelativeNtPathName_U
RtlAppendUnicodeStringToString
RtlGenerate8dot3Name
NtQueryFullAttributesFile
RtlDestroyEnvironment
RtlSetEnvironmentVariable
RtlCreateEnvironment
RtlxUnicodeStringToOemSize
NlsMbOemCodePageTag
RtlFreeOemString
RtlSetCurrentDirectory_U
NtQuerySystemInformation
NtQueryVirtualMemory
RtlCharToInteger
advapi32
RegOpenKeyExA
RegQueryInfoKeyA
RegCloseKey
RegQueryValueExA
RegEnumValueA
gdi32
SetPaletteEntries
SelectPalette
RemoveFontResourceW
CreatePalette
user32
SetForegroundWindow
GetKeyboardType
CharToOemBuffA
LoadStringA
LoadStringW
GetWindowThreadProcessId
SendMessageA
ShowWindow
SetWindowPos
ScreenToClient
GetWindowRect
GetDlgItem
GetSystemMetrics
GetDesktopWindow
GetUserObjectInformationA
GetThreadDesktop
SetWindowLongA
SetWindowTextA
LoadIconA
EndDialog
SendDlgItemMessageA
CharUpperBuffW
DialogBoxParamA
GetWindowLongA
DefWindowProcA
EnumWindows
ShowStartGlass
FindWindowA
GetForegroundWindow
MessageBeep
SetCursorPos
GetCursorPos
ClipCursor
DeleteMenu
AppendMenuW
ModifyMenuW
GetClipCursor
GetKeyState
PostMessageA
VkKeyScanW
MapVirtualKeyA
sfc
SfcIsFileProtected
shell32
SetCurrentProcessExplicitAppUserModelID
Exports
Exports
BlockWOWIdle
CurrentMonitorTeb
DBGNotifyDebugged
DBGNotifyNewTask
DBGNotifyRemoteThreadAddress
DispatchInterrupts
Dos_Flag_Addr
DpmiSetIncrementalAlloc
ExpLdt
FlatAddress
GetDOSAppName
IsCdRomFile
MGetVdmPointer
RedirectLongFileName
RedirectShortFileName
RegisterWOWIdle
ResumeTimerThread
SelectorLimit
SetShadowDescriptorEntries
ShortPathEnvVar
Sim32pGetVDMPointer
SoftPcEoi
SuspendTimerThread
VDDAllocMem
VDDAllocateDosHandle
VDDAssociateNtHandle
VDDDeInstallIOHook
VDDDeInstallMemoryHook
VDDDeInstallUserHook
VDDExcludeMem
VDDFreeMem
VDDIncludeMem
VDDInstallIOHook
VDDInstallMemoryHook
VDDInstallUserHook
VDDQueryDMA
VDDReleaseDosHandle
VDDReleaseIrqLine
VDDRequestDMA
VDDReserveIrqLine
VDDRetrieveNtHandle
VDDSetDMA
VDDSimulate16
VDDTerminateVDM
VdmDbgAttach
VdmGetParametersInfoError
VdmMapFlat
VdmParametersInfo
VdmTraceEvent
WOWSysErrorBox
WaitIfIdle
call_ica_hw_interrupt
cmdCheckTemp
cmdCheckTempInit
cpu_createthread
demClientErrorEx
demFileDelete
demFileFindFirst
demFileFindNext
demGetFileTimeByHandle_WOW
demGetPhysicalDriveType
demIsShortPathName
demLFNCleanup
demLFNGetCurrentDirectory
demSetCurrentDirectoryGetDrive
demWOWLFNAllocateSearchHandle
demWOWLFNCloseSearchHandle
demWOWLFNEntry
demWOWLFNGetSearchHandle
demWOWLFNInit
fSeparateWow
getAF
getAH
getAL
getAX
getBH
getBL
getBP
getBX
getCF
getCH
getCL
getCS
getCX
getDF
getDH
getDI
getDL
getDS
getDX
getEAX
getEBP
getEBX
getECX
getEDI
getEDX
getEFLAGS
getEIP
getES
getESI
getESP
getFS
getGS
getIF
getIP
getIntelRegistersPointer
getMSW
getOF
getPF
getSF
getSI
getSP
getSS
getZF
host_CreateThread
host_ExitThread
host_com_close
host_direct_access_error
host_simulate
pDeviceChain
setAF
setAH
setAL
setAX
setBH
setBL
setBP
setBX
setCF
setCH
setCL
setCS
setCX
setDF
setDH
setDI
setDL
setDS
setDX
setEAX
setEBP
setEBX
setECX
setEDI
setEDX
setEFLAGS
setEIP
setES
setESI
setESP
setFS
setGS
setIF
setIP
setMSW
setOF
setPF
setSF
setSI
setSP
setSS
setZF
Sections
.text Size: 449KB - Virtual size: 449KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 274KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 60KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE