msdtctm.pdb
Static task
static1
Behavioral task
behavioral1
Sample
089825c8c57b073bb37f77cc892f97a0_NeikiAnalytics.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
089825c8c57b073bb37f77cc892f97a0_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
089825c8c57b073bb37f77cc892f97a0_NeikiAnalytics.exe
-
Size
933KB
-
MD5
089825c8c57b073bb37f77cc892f97a0
-
SHA1
ea6611217b2cf77c2c711b2d0cd1137cec63701c
-
SHA256
3adc3a41308d1a28b5650895a0bded3ba33e90616c7eac42e690e3ade32773f7
-
SHA512
f8fac1998e3dca7fb1d0ce35de2b45f2dcf955dca9ef1c39c3d77db660daad052433fc7e4ff1e0ecf5ace2da8400a17a2b5c008f00087a6812e400d5e8efa288
-
SSDEEP
12288:j6uyFVwIkVbGan3HV/Rnp8RutmhIjLt1FTaWtP:DyDw7VVHV/RnnacvX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 089825c8c57b073bb37f77cc892f97a0_NeikiAnalytics.exe
Files
-
089825c8c57b073bb37f77cc892f97a0_NeikiAnalytics.exe.dll regsvr32 windows:5 windows x86 arch:x86
cfd9ddf7236fd4eaf11a0d9a2066af0e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
advapi32
RegQueryValueExA
RegNotifyChangeKeyValue
FlushTraceW
StopTraceW
EnableTrace
RegisterTraceGuidsW
TraceEvent
UnregisterTraceGuids
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
QueryTraceW
StartTraceW
ReportEventW
RegisterEventSourceW
ReportEventA
DeregisterEventSource
RegOpenKeyExA
RegDeleteValueW
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
SetServiceStatus
GetSecurityDescriptorOwner
GetSecurityDescriptorGroup
GetSecurityDescriptorDacl
GetSecurityDescriptorSacl
SetNamedSecurityInfoW
RegQueryValueW
GetNamedSecurityInfoW
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
RegCreateKeyExW
GetSecurityDescriptorLength
RegSetValueExW
RegConnectRegistryW
RegQueryValueExW
RegQueryInfoKeyW
RegEnumKeyExW
RegOpenKeyExW
RegDeleteKeyW
RegCreateKeyA
RegSetValueExA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
dnsapi
DnsValidateName_A
gdi32
GetStockObject
kernel32
Sleep
MultiByteToWideChar
GetComputerNameW
SetConsoleCtrlHandler
GetStdHandle
AllocConsole
SetErrorMode
OpenEventA
SuspendThread
ResumeThread
LoadLibraryW
TlsGetValue
TlsFree
OpenProcess
TlsSetValue
GetCurrentThread
IsDebuggerPresent
VirtualFree
VirtualAlloc
GetThreadContext
GetCommandLineW
lstrcatA
VirtualQueryEx
TlsAlloc
InterlockedExchange
SetLastError
WaitForMultipleObjects
CreateEventW
MoveFileW
MoveFileExW
GetFileAttributesW
OutputDebugStringA
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcessId
GetCommandLineA
TerminateProcess
GetCurrentProcess
SetEvent
InterlockedIncrement
InterlockedDecrement
RaiseException
InitializeCriticalSection
WaitForSingleObject
CreateEventA
lstrlenA
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetSystemWindowsDirectoryA
GetLocalTime
DisableThreadLibraryCalls
CreateDirectoryW
lstrlenW
InterlockedCompareExchange
CreateTimerQueueTimer
DeleteTimerQueueTimer
ChangeTimerQueueTimer
QueueUserWorkItem
ReadFile
WriteFile
CreateIoCompletionPort
GetModuleFileNameA
GetQueuedCompletionStatus
PostQueuedCompletionStatus
lstrcpyA
lstrcpynA
OpenFileMappingA
MapViewOfFile
OpenMutexA
UnmapViewOfFile
FlushViewOfFile
ReleaseMutex
ResetEvent
TerminateThread
GetUserDefaultLCID
GetLocaleInfoA
FormatMessageA
LocalFree
GetSystemTime
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
WideCharToMultiByte
GetVersionExA
GetSystemInfo
CreateThread
WaitForMultipleObjectsEx
CloseHandle
GetLastError
msdtclog
?DllGetDTCLOG@@YGHABU_GUID@@0PAPAX@Z
msdtcprx
?ApplyAccountSettings@@YGJHPAGK000H@Z
?SetAccount@CService@@QAEJPAG0@Z
?SetAccountInfoInRegistryW@@YGJPAG@Z
?Create@CService@@SGJPAPAV1@PAGPAVCServiceControlManager@@K1@Z
?GetTmUIContactA@@YAJPAD0PAPAUIProperties@@@Z
?MsDtcSPNFree@@YGJPAPAG@Z
?GetMsDtcSPN@@YGJPAGPAPAG@Z
?GetTmContactW@@YAJPAG0PAPAUIProperties@@@Z
?CheckForDCPromotionDemotion@@YGJPAG@Z
?Release@CService@@QAEKXZ
?InstallDtcClient@@YGJPAGKK@Z
?GetDefaultLogPath@@YGPAGXZ
?GetDefaultServiceNameW@@YAPAGXZ
?GetDefaultServicePath@@YGPAGXZ
?SetEventLogSourceToMsdtcCore@@YGXXZ
?GetDefaultLogSize@@YGKXZ
?InstallDtc@@YGJPAG0000H0H@Z
?RemoveDtc@@YGJPAG00@Z
?GetSecurityRegValueW@@YGJPAGPBGPAEPAK@Z
?VerifyAccountInfo@@YGJXZ
?GetDtcLogPath@@YGHKPAG@Z
?GetDtcCIDProps@@YGHAAU_LOG_PROPERTIES@@AAU_DAC_PROPERTIES@@@Z
?Win95Present@@YGHXZ
?GetSecurityConfigurationOptions@@YGJPAGPAK1@Z
ord27
?GetXATmSecurityKey@@YGJPAG0PAK@Z
?DtcWriteToEventLogger@@YGJKKKKPAXPAD@Z
ord26
ord25
?DtcWriteToEventLoggerEx@@YGJGGKPAXGKPAPBD0@Z
msvcp60
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
??Mstd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
msvcrt
_mbstok
_mbsicmp
_mbslen
_endthreadex
fprintf
_strnicmp
_snwprintf
strrchr
setlocale
_stricmp
_beginthread
_open_osfhandle
_fdopen
_iob
setvbuf
_vsnprintf
wcscat
exit
_wcsicmp
_mbsnbcpy
fflush
fclose
strncat
fopen
_mbsncpy
sprintf
wcslen
malloc
_snprintf
strncpy
free
__CxxFrameHandler
_purecall
rand
srand
time
strchr
_CxxThrowException
_mbscpy
printf
localtime
_strdup
isxdigit
isalnum
atol
isdigit
memmove
atoi
_vsnwprintf
wcsrchr
??1type_info@@UAE@XZ
_except_handler3
?terminate@@YAXXZ
__dllonexit
_onexit
_adjust_fdiv
_initterm
wcscpy
swprintf
wcscmp
wcsncmp
wcsncpy
wcstombs
mtxclu
MtxCluTakeOfflineDTCW
MtxCluGetDTCIpAddressA
MtxCluIsSameNodeW
MtxCluGetComputerNameW
MtxCluGetDTCLogPathW
MtxCluDoesDTCResourceExistA
MtxCluUninitialize
MtxCluInitialize
MtxCluCheckIfOkToStartDtc
MtxCluDoesDTCResourceExistW
MtxCluBringOnlineDTCW
MtxCluIsClusterPresent
ole32
CoCreateGuid
ComPs_NdrDllUnregisterProxy
ComPs_NdrDllRegisterProxy
CoTaskMemAlloc
CoUninitialize
CoGetClassObject
CoInitializeEx
CoTaskMemRealloc
ComPs_NdrDllGetClassObject
CoCreateInstance
StringFromGUID2
CoGetInterceptor
CoTaskMemFree
rpcrt4
NdrCStdStubBuffer_Release
NdrOleAllocate
NdrOleFree
IUnknown_QueryInterface_Proxy
IUnknown_AddRef_Proxy
IUnknown_Release_Proxy
CStdStubBuffer_QueryInterface
CStdStubBuffer_Connect
CStdStubBuffer_AddRef
CStdStubBuffer_Disconnect
RpcStringFreeA
UuidToStringA
UuidHash
UuidFromStringA
RpcStringFreeW
UuidToStringW
UuidCreate
UuidCompare
CStdStubBuffer_DebugServerRelease
CStdStubBuffer_DebugServerQueryInterface
CStdStubBuffer_CountRefs
CStdStubBuffer_IsIIDSupported
CStdStubBuffer_Invoke
secur32
LsaRegisterPolicyChangeNotification
user32
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
PostThreadMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
wsprintfA
GetMessageA
wsprintfW
winmm
timeBeginPeriod
timeEndPeriod
timeGetDevCaps
wsock32
gethostbyaddr
ioctlsocket
WSAAsyncSelect
connect
WSAAsyncGetHostByName
ntohs
inet_addr
htons
bind
listen
WSAStartup
WSACleanup
socket
ord1141
WSAGetLastError
getsockopt
shutdown
ord1142
setsockopt
closesocket
ntohl
htonl
gethostbyname
xolehlp
DtcGetTransactionManagerExA
Exports
Exports
?Create@CUISCore@@SGJPAPAV1@PAUIUnknown@@@Z
?CreateInstance@CTm@@SGJPAPAV1@PAUIUnknown@@@Z
?CreateInstance@CXaTmCore@@SGJPAPAV1@PAUIUnknown@@@Z
?CreateThreadPool@@YGJXZ
?DllGetMapper_IGatewayTxFactory@@YGJABU_GUID@@PAPAX@Z
?DllGetMapper_ITxBeginFactory@@YGJABU_GUID@@PAPAX@Z
ASCDefer
ASCDeliverDeferred
ASCGetSafeReference
ASCWrapClassFactory
ASCWrapObject
DllGetClassObject
DllRegisterServer
DllUnregisterServer
DtcMainExt
_GetTipFunctionalityWorking@0
_SetTipFunctionalityWorking@4
Sections
.text Size: 790KB - Virtual size: 790KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.orpc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ