PerfHost.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0d5ac4f0812086e9ffdce571e7001a60_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
0d5ac4f0812086e9ffdce571e7001a60_NeikiAnalytics.exe
-
Size
588KB
-
MD5
0d5ac4f0812086e9ffdce571e7001a60
-
SHA1
1b8ec6d79e879a203180cf9ff87a3878d1886210
-
SHA256
216fcc29c429d25ab1670b15ae5a1047540277a9680f0f8ce40481ab99b60413
-
SHA512
f4e4f5f0926c76c382e5e2f5a23dec877f8ec5d261ee1b7b9e6079f580cbba43ee2cab79439d163003821bd79a3ca984bd7bd9884e4f3fe791268f220fe56a5c
-
SSDEEP
12288:Vw3FN92mrRUDkDTYNmN3Rus3SAFYq8Noz9qirzrEX1fsd7TOoOTd:Vw1N3RUDHNmdPCAaq8Nozgi/rE0TOj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d5ac4f0812086e9ffdce571e7001a60_NeikiAnalytics.exe
Files
-
0d5ac4f0812086e9ffdce571e7001a60_NeikiAnalytics.exe.exe windows:10 windows x86 arch:x86
3b1494b15b4dae22812c269c29d3e478
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_wcsicmp
_exit
_amsg_exit
__p__commode
_vsnwprintf
exit
__wgetmainargs
_XcptFilter
memcpy
_cexit
__p__fmode
__setusermatherr
_initterm
?terminate@@YAXXZ
_except_handler4_common
__set_app_type
_controlfp
memset
ntdll
NtClose
NtQueryInformationToken
RtlNtStatusToDosError
NtOpenThreadToken
EtwEventWrite
RtlAllocateHeap
RtlExpandEnvironmentStrings
EtwEventUnregister
EtwEventRegister
RtlReleaseSRWLockShared
RtlAcquireSRWLockShared
RtlReleaseSRWLockExclusive
RtlAcquireSRWLockExclusive
RtlFreeHeap
rpcrt4
RpcServerUseProtseqW
RpcRevertToSelf
RpcEpRegisterW
RpcServerInqBindings
RpcServerRegisterIfEx
RpcServerUnregisterIf
RpcBindingVectorFree
RpcEpUnregister
RpcStringFreeW
RpcStringBindingParseW
RpcBindingToStringBindingW
RpcBindingInqAuthClientW
RpcImpersonateClient
NdrServerCall2
api-ms-win-core-errorhandling-l1-1-0
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetLastError
api-ms-win-core-heap-l1-1-0
HeapSetInformation
api-ms-win-core-libraryloader-l1-2-0
GetModuleHandleW
GetProcAddress
LoadLibraryExW
FreeLibrary
api-ms-win-core-registry-l1-1-0
RegOpenKeyExW
RegQueryValueExW
RegQueryValueExA
RegCloseKey
api-ms-win-core-processthreads-l1-1-0
GetCurrentThreadId
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-synch-l1-1-0
InitializeSRWLock
api-ms-win-core-synch-l1-2-0
Sleep
api-ms-win-core-sysinfo-l1-1-0
GetTickCount
GetSystemTimeAsFileTime
api-ms-win-core-threadpool-l1-2-0
CloseThreadpoolWork
SubmitThreadpoolWork
CreateThreadpoolWork
api-ms-win-service-core-l1-1-0
SetServiceStatus
RegisterServiceCtrlHandlerExW
StartServiceCtrlDispatcherW
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 956B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE