C:\Data\Projects\Fiscalizations\Germany\RDC\SignatureTestToolTrunk\output\x64\Release\sigtestDLL.pdb
Static task
static1
Behavioral task
behavioral1
Sample
173b53410eaa34531f9c358dc4d48500_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
173b53410eaa34531f9c358dc4d48500_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
173b53410eaa34531f9c358dc4d48500_NeikiAnalytics.exe
-
Size
367KB
-
MD5
173b53410eaa34531f9c358dc4d48500
-
SHA1
99b7dc2dea2d712eb417197be29f15719f9df51f
-
SHA256
3696a4ba1f7269a72e4b05f3ce34e5cda00e77f4123384432b34ef3b98a181e5
-
SHA512
73efd0735592f3669b713b83cf9bfd7891d2d3dab1528e18036fa1219708d452e49b11992fe936ea19335fa6cf689395c69e27d00fdef01190d74468c4137eb0
-
SSDEEP
6144:tBX++TY5M/Cve2O+ksvq/APivocIOaf6Zly5Ub2gvSX073z0l2cg7YMohAgPWIO0:tJ+++1mJhs0AqLny0vP8MoqQWV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 173b53410eaa34531f9c358dc4d48500_NeikiAnalytics.exe
Files
-
173b53410eaa34531f9c358dc4d48500_NeikiAnalytics.exe.dll windows:6 windows x64 arch:x64
adb8cce75574d6ef0a454585f871c294
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
libcrypto-1_1-x64
BN_hex2bn
BN_bn2bin
BN_free
X509_get_pubkey
o2i_ECPublicKey
BIO_new_file
EVP_PKEY_get1_EC_KEY
EVP_MD_CTX_new
OPENSSL_init_crypto
ERR_print_errors_fp
EVP_sha256
EVP_DigestUpdate
PEM_read_bio_X509
SHA384
EC_KEY_check_key
EVP_DecodeBlock
EC_KEY_free
EVP_MD_CTX_free
EVP_DigestInit_ex
ECDSA_SIG_free
EVP_PKEY_free
BIO_free
BN_new
ECDSA_SIG_set0
X509_free
ECDSA_do_verify
OBJ_txt2nid
EC_KEY_new_by_curve_name
ECDSA_SIG_new
BN_bin2bn
EVP_DigestFinal_ex
kernel32
SetUnhandledExceptionFilter
SetEndOfFile
HeapSize
ReadConsoleW
WriteConsoleW
CreateFileW
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
GetProcessHeap
SetFilePointerEx
ReadFile
GetConsoleMode
GetConsoleCP
WriteFile
FlushFileBuffers
GetTimeZoneInformation
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
CompareStringW
LCMapStringW
GetLocaleInfoW
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
GetStringTypeW
GetCPInfo
CloseHandle
SetEvent
ResetEvent
WaitForSingleObjectEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlPcToFileHeader
RaiseException
RtlUnwindEx
GetLastError
FreeLibrary
LoadLibraryExW
InterlockedFlushSList
HeapAlloc
HeapReAlloc
HeapFree
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetACP
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetFileType
Exports
Exports
?compareQRWithLogFile@epson@@YA?AW4CMP_RESULTS@1@AEBV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@0@Z
?getComparisonErrorMsgs@epson@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@XZ
?getLogErrorMsgs@epson@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@XZ
?getQRErrorMsgs@epson@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@XZ
?validateLogFile@epson@@YA?AW4LOG_RESULTS@1@AEBV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@0@Z
?validateQRCode@epson@@YA?AW4QR_RESULTS@1@AEBV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@@Z
compareQRWithLogFile
getComparisonErrorMsgs
getLogErrorMsgs
getQRErrorMsgs
validateLogFile
validateQRCode
Sections
.text Size: 239KB - Virtual size: 238KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 203KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 1024B - Virtual size: 808B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ