XpsAnalyzer.pdb
Static task
static1
General
-
Target
02175294fd67fd63b6cda2ccf7d45630_NeikiAnalytics.exe
-
Size
868KB
-
MD5
02175294fd67fd63b6cda2ccf7d45630
-
SHA1
1e6c71fdc4e8743224060373335f539a5281c933
-
SHA256
174bb46a5fa12036a927144a8a11dc3ab85d8f346c5baaddf0353578fdf8c878
-
SHA512
35c1c917dd9f6e5d3bd21d23c5b719d788915eaad04d4acc52509d23ce46545e187e5e1689b7e66e34a58f8219fd6577dc346f6a0f3e26f4b619d8f01c0b4e3f
-
SSDEEP
24576:NgXyT8NDFKYmKOF0zr31JwAlcR3QC0OXxc0H:N6yTgDUYmvFur31yAipQCtXxc0H
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 02175294fd67fd63b6cda2ccf7d45630_NeikiAnalytics.exe
Files
-
02175294fd67fd63b6cda2ccf7d45630_NeikiAnalytics.exe.exe windows:10 windows x64 arch:x64
1a963b7baa888669e4231c8d9a574fa3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
InitializeCriticalSection
DeleteCriticalSection
WideCharToMultiByte
LocalFree
EnterCriticalSection
MultiByteToWideChar
LeaveCriticalSection
GetProcAddress
LoadLibraryW
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetFileSize
CreateFileW
HeapSetInformation
SetConsoleTextAttribute
GetStdHandle
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
OutputDebugStringA
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
Sleep
DebugBreak
OutputDebugStringW
GetLastError
FindClose
FindNextFileW
GetVersionExW
FindFirstFileW
msvcrt
_initterm
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
_amsg_exit
_XcptFilter
_CxxThrowException
_callnewh
??0exception@@QEAA@AEBQEBDH@Z
malloc
free
memmove_s
printf
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@AEBQEBD@Z
??0exception@@QEAA@XZ
fclose
fwrite
fputwc
___mb_cur_max_func
fflush
setvbuf
fgetpos
fseek
fsetpos
__C_specific_handler
fgetc
fgetwc
ungetwc
fputc
_itow
memset
localeconv
strcspn
_wstat
_wctime
_errno
___lc_handle_func
___lc_codepage_func
setlocale
__pctype_func
__mb_cur_max
_fsopen
_wfsopen
isupper
__crtLCMapStringA
__crtLCMapStringW
__crtGetStringTypeW
islower
__uncaught_exception
abort
memchr
_fmode
__CxxFrameHandler3
wprintf
_waccess
memcpy_s
_wcsicmp
_commode
?terminate@@YAXXZ
??1type_info@@UEAA@XZ
_lock
_unlock
__dllonexit
_onexit
ungetc
sprintf_s
??1exception@@UEAA@XZ
?what@exception@@UEBAPEBDXZ
_purecall
advapi32
CryptGetHashParam
CryptCreateHash
CryptAcquireContextW
CryptDestroyHash
CryptReleaseContext
CryptHashData
ole32
StgIsStorageFile
CreateStreamOnHGlobal
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
oleaut32
VariantClear
SysAllocString
SysFreeString
crypt32
CertFreeCertificateContext
Sections
.text Size: 194KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE