e:\广告相关\广告\私服劫持\SFHook\桌标\bin\release\DK.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2f43a4a556b9337b11fe942a2b4e83d0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2f43a4a556b9337b11fe942a2b4e83d0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
2f43a4a556b9337b11fe942a2b4e83d0_NeikiAnalytics.exe
-
Size
512KB
-
MD5
2f43a4a556b9337b11fe942a2b4e83d0
-
SHA1
43248bedcf8b9b1c139eb298c8e7467437ceebbb
-
SHA256
507cd65ce450b48bfc1266189e88a2cbdd4b10ce0b952cb742ccbb3000d5fcdf
-
SHA512
e941ee00353663bc60c010438483526b8a0a05d73338cac07194f8705fd6c61e957b007eada4fe15d29164cf696a3bedc66d2eb0e82422e6b0e7fb427487b932
-
SSDEEP
6144:9RNLwQbH23uAOXmH0nZ3IwjmOexf5wlkD6C5AvYZtAOsTf:x72+ASG6Z3fjAxf4S6C+vWt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2f43a4a556b9337b11fe942a2b4e83d0_NeikiAnalytics.exe
Files
-
2f43a4a556b9337b11fe942a2b4e83d0_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
ac1a7b9413c363dbcf1a913eb8907ca7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
EnterCriticalSection
GetCurrentThreadId
Sleep
OutputDebugStringA
OpenProcess
OpenEventA
OpenFileMappingA
WaitNamedPipeA
LocalFree
CreateMutexA
ReadFile
GetLastError
ResumeThread
GetLocalTime
MapViewOfFile
UnmapViewOfFile
GetWindowsDirectoryA
OpenThread
GetCurrentProcess
GetPrivateProfileStringA
QueryDosDeviceA
Process32NextW
GetLogicalDriveStringsA
Process32FirstW
InitializeCriticalSection
CreateDirectoryA
GetFileSize
GetProcessTimes
DeleteFileA
DuplicateHandle
SetFileAttributesA
MultiByteToWideChar
WideCharToMultiByte
LocalFileTimeToFileTime
GetCurrentDirectoryW
SetFilePointer
SystemTimeToFileTime
GetTickCount
CreateEventA
WaitForSingleObject
GetModuleFileNameA
GetCurrentProcessId
SetUnhandledExceptionFilter
WriteFile
SetEvent
CreateFileMappingA
GetFileAttributesA
LeaveCriticalSection
OpenMutexA
CloseHandle
DeviceIoControl
CreateToolhelp32Snapshot
SetEndOfFile
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
CreateFileA
GetStringTypeW
GetStringTypeA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LoadLibraryA
InterlockedExchange
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
ExitThread
CreateThread
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
GetCommandLineA
GetVersionExA
GetProcessHeap
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
ExitProcess
RaiseException
HeapSize
GetConsoleCP
GetConsoleMode
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
FlushFileBuffers
FreeEnvironmentStringsA
user32
wsprintfA
advapi32
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
RegOpenKeyExA
RegEnumKeyExA
SetEntriesInAclA
GetNamedSecurityInfoA
RegCloseKey
BuildExplicitAccessWithNameA
RegDeleteValueA
SetNamedSecurityInfoA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
SHChangeNotify
ole32
CoCreateGuid
CoInitialize
psapi
GetProcessImageFileNameA
iphlpapi
GetAdaptersInfo
wininet
InternetCloseHandle
InternetConnectA
InternetSetOptionA
InternetReadFile
HttpSendRequestA
HttpOpenRequestA
InternetOpenA
InternetQueryOptionA
HttpQueryInfoA
Sections
.text Size: 384KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 690B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ