E:\公司自开发产品\公司WMS系统\服务端注册\_int\服务端注册码生成器\debug\x64\debuger\服务端注册码生成器.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3a6b7401391363ac907748d042a02d30_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3a6b7401391363ac907748d042a02d30_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
3a6b7401391363ac907748d042a02d30_NeikiAnalytics.exe
-
Size
2.5MB
-
MD5
3a6b7401391363ac907748d042a02d30
-
SHA1
8102cf44838793131b4c29fa80233499688735a7
-
SHA256
3e56ece083a05aedfd1dc3c468e2c97c4116351cb2b779651f062c62394d9305
-
SHA512
fb4ef4285626904e1a3e365dfe9590161a49ed26b0a752d81dfe6d9b1edbbf154261e6c3438a4fbcc121550ad0da9b9c983f51f070fde9bbcd643f7bdcf9299c
-
SSDEEP
24576:k51h5AXJGLKboxKe2QzxkJlhKpZ8pFpd8U4vcwqj:k5dAXgKboxv2oxkJWGwU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a6b7401391363ac907748d042a02d30_NeikiAnalytics.exe
Files
-
3a6b7401391363ac907748d042a02d30_NeikiAnalytics.exe.exe windows:6 windows x64 arch:x64
35e5fba8563a56cf254c33313ffa298f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetModuleFileNameW
GlobalFlags
LocalFree
FormatMessageW
CopyFileW
IsBadReadPtr
IsBadWritePtr
SetSystemPowerState
MultiByteToWideChar
WideCharToMultiByte
GenerateConsoleCtrlEvent
GetQueuedCompletionStatus
SetEvent
ResetEvent
CreateEventW
Sleep
CreateThread
SetThreadPriority
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
GetLocalTime
SetLocalTime
FileTimeToSystemTime
LoadLibraryExW
lstrcmpiW
VerSetConditionMask
VerifyVersionInfoW
SetEndOfFile
CreateFileW
FlushFileBuffers
GetStringTypeW
SetStdHandle
HeapQueryInformation
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
EnumSystemLocalesW
GetVersionExW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetFileSizeEx
GetConsoleOutputCP
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetCurrentThread
SetConsoleCtrlHandler
WriteFile
HeapValidate
GetCommandLineA
WriteConsoleW
GetFileType
GetStdHandle
GetModuleHandleExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InterlockedFlushSList
RtlPcToFileHeader
RtlUnwindEx
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WaitForSingleObjectEx
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
GetSystemDirectoryW
GetSystemInfo
OpenProcess
CreateProcessW
GetExitCodeProcess
TerminateProcess
GetCurrentProcessId
GetCurrentProcess
WaitForSingleObject
PeekNamedPipe
CreatePipe
CloseHandle
RemoveDirectoryW
ReadFile
GetFileAttributesExW
GetFileAttributesW
FindNextFileW
FindFirstFileW
FindClose
VirtualQuery
DeleteFileW
CreateDirectoryW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetCommandLineW
GetUserDefaultLCID
LoadLibraryW
GetProcAddress
FreeLibrary
FindResourceW
SizeofResource
LockResource
LoadResource
FreeResource
GetTickCount
ExitProcess
DebugBreak
MulDiv
GlobalFree
GlobalLock
GlobalUnlock
GlobalSize
GlobalReAlloc
GlobalAlloc
OutputDebugStringW
GetModuleHandleW
GetCurrentThreadId
LeaveCriticalSection
IsBadStringPtrW
IsDebuggerPresent
TryEnterCriticalSection
EnterCriticalSection
InitializeCriticalSection
IsBadStringPtrA
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
RtlUnwind
HeapAlloc
HeapDestroy
SetLastError
GetLastError
RaiseException
IsValidLocale
DecodePointer
user32
GetSysColor
GetDlgItem
CallWindowProcW
SetWindowLongPtrW
GetClassInfoExW
RegisterClassExW
PostQuitMessage
CharNextW
wsprintfW
GetCursorPos
TrackPopupMenu
FillRect
ModifyMenuW
AppendMenuW
InsertMenuW
GetMenuItemCount
GetSubMenu
GetDlgCtrlID
CheckMenuItem
DestroyMenu
CreatePopupMenu
CreateMenu
GetMenu
TranslateAcceleratorW
IsMenu
IsChild
IsWindowVisible
IsIconic
DeleteMenu
GetNextDlgTabItem
SetFocus
UnregisterClassW
MessageBoxW
IsWindow
DestroyWindow
SetWindowPos
InvalidateRect
GetWindowLongW
SetWindowLongW
GetMessageW
TranslateMessage
DispatchMessageW
GetFocus
IsWindowEnabled
SetMenu
GetSystemMenu
DrawIcon
BeginPaint
EndPaint
SetWindowRgn
IntersectRect
IsRectEmpty
GetClassNameW
GetLastActivePopup
IsDialogMessageW
WinHelpW
RedrawWindow
MessageBeep
ClientToScreen
ScreenToClient
OffsetRect
PtInRect
SetParent
DrawTextW
IsZoomed
GetTopWindow
DestroyIcon
EnableMenuItem
DestroyAcceleratorTable
SetRect
CreateAcceleratorTableW
GetMonitorInfoW
MonitorFromWindow
EnumDisplaySettingsW
PeekMessageW
DefWindowProcW
SendMessageW
ShowWindow
GetKeyState
EnableWindow
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
AdjustWindowRectEx
SetCursor
GetWindow
GetSystemMetrics
GetDC
GetWindowDC
ReleaseDC
GetClientRect
GetWindowRect
LoadStringW
PostMessageW
RegisterClassW
GetClassInfoW
CreateWindowExW
GetActiveWindow
SetTimer
SetPropW
GetPropW
RemovePropW
GetWindowLongPtrW
GetDesktopWindow
GetParent
LoadCursorW
LoadIconW
LoadImageW
CopyImage
ExitWindowsEx
AttachThreadInput
GetWindowThreadProcessId
EnumWindows
SetForegroundWindow
SetActiveWindow
EmptyClipboard
GetClipboardData
SetClipboardData
CloseClipboard
OpenClipboard
MoveWindow
WaitForInputIdle
gdi32
GetTextExtentPoint32W
CreateSolidBrush
SetBkColor
SetTextColor
CreateEllipticRgn
CreateRoundRectRgn
GetClipBox
ExcludeClipRect
GetObjectType
GetTextMetricsW
SetBkMode
CombineRgn
CreateBitmap
CreateFontIndirectW
CreateHatchBrush
CreatePatternBrush
CreateRectRgn
ExtCreateRegion
GetPixel
GetViewportOrgEx
GetWindowExtEx
GetWindowOrgEx
SetMapMode
SetPixel
SetViewportOrgEx
SetWindowExtEx
SetWindowOrgEx
GetObjectW
SetDIBColorTable
CreateDIBSection
GdiAlphaBlend
SetStretchBltMode
StretchBlt
SelectPalette
SelectObject
RealizePalette
GetSystemPaletteEntries
GetStockObject
GetDIBits
GetDeviceCaps
DeleteDC
CreatePalette
DeleteObject
BitBlt
CreateBrushIndirect
CreateCompatibleDC
CreateCompatibleBitmap
advapi32
RegSetValueExW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegCloseKey
RegCreateKeyExW
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
OpenProcessToken
RegQueryValueExW
RegQueryValueW
RegOpenKeyExW
shell32
ShellExecuteW
DragAcceptFiles
DragFinish
DragQueryFileW
Shell_NotifyIconW
ole32
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
OleRun
CLSIDFromProgID
CreateStreamOnHGlobal
CLSIDFromString
CoCreateInstance
CoInitializeEx
CoUninitialize
IIDFromString
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
VarUdateFromDate
OleCreatePictureIndirect
OleCreateFontIndirect
GetActiveObject
RegisterTypeLi
LoadTypeLi
LHashValOfNameSys
VarCmp
VariantChangeType
VariantCopyInd
VariantCopy
VariantClear
VariantInit
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayGetElemsize
SafeArrayGetDim
SafeArrayCreate
SysStringLen
SysAllocString
SysFreeString
VarUI4FromStr
comctl32
ImageList_Create
ImageList_Destroy
ImageList_AddMasked
InitCommonControlsEx
bcrypt
BCryptSetProperty
BCryptCloseAlgorithmProvider
BCryptGenerateSymmetricKey
BCryptEncrypt
BCryptDecrypt
BCryptDestroyKey
BCryptOpenAlgorithmProvider
BCryptGetProperty
gdiplus
GdipCreateBitmapFromStream
GdipGetImagePaletteSize
GdipGetImagePalette
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipCreateBitmapFromFile
GdipDisposeImage
GdipCloneImage
GdiplusShutdown
GdipCreateBitmapFromStreamICM
GdipFree
GdipAlloc
GdipDrawImageRectI
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromScan0
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipDeleteGraphics
GdipSetCompositingMode
GdipGetImageGraphicsContext
GdiplusStartup
uxtheme
SetWindowTheme
ws2_32
WSAStartup
WSACleanup
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 899KB - Virtual size: 898KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 93KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ