t:\xdocs\x86\ship\0\regform.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6fd10a1cbba1243e0cd8da88e3d1d0d0_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
6fd10a1cbba1243e0cd8da88e3d1d0d0_NeikiAnalytics.exe
-
Size
1.3MB
-
MD5
6fd10a1cbba1243e0cd8da88e3d1d0d0
-
SHA1
9a8a99be0706dc344410f9e927473e7731817c49
-
SHA256
981caa535fef03ef13a8dfc06819377adca92a63ff5438448309936f0bdf26cc
-
SHA512
5bd0e9eb7f6c6a782af0c0589736245db5ed5f5a451a4cbff4d8ae71b13a5e56074da64d6bbecc24be68a6eb0c7fe108c14e6f54ad02db72c295405a83c14005
-
SSDEEP
24576:xkuKnonizr8EzERVY7zpCGSbvdfvDJO5:quVizr8+ER49CGSjJd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6fd10a1cbba1243e0cd8da88e3d1d0d0_NeikiAnalytics.exe
Files
-
6fd10a1cbba1243e0cd8da88e3d1d0d0_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
bc8221a0c44b76b0f235068c59bcc8b6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegDeleteKeyW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
RegOpenKeyExA
RegQueryValueExA
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
cabinet
ord11
ord23
ord14
ord13
ord20
ord22
ord10
rpcrt4
RpcStringFreeW
UuidToStringW
UuidCreate
kernel32
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
Sleep
GetTempPathA
CloseHandle
GetFileAttributesW
FileTimeToDosDateTime
FileTimeToLocalFileTime
GetFileInformationByHandle
GetLastError
FindClose
FindFirstFileW
lstrlenW
RaiseException
GetUserDefaultLCID
GetFullPathNameW
DeleteFileW
GetTempFileNameW
GetTempPathW
FormatMessageW
WaitForSingleObject
CreateProcessW
SetUnhandledExceptionFilter
SizeofResource
LockResource
LoadResource
FindResourceW
InitializeCriticalSection
DeleteCriticalSection
MultiByteToWideChar
CreateDirectoryW
lstrcmpiW
FreeLibrary
LoadLibraryExW
GetModuleHandleW
GetModuleFileNameW
FindResourceExW
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
EnterCriticalSection
LeaveCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
GetTempFileNameA
CreateProcessA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
VirtualProtect
LocalAlloc
LoadLibraryA
FormatMessageA
LocalFree
GetSystemDirectoryW
GetProcAddress
IsDebuggerPresent
WriteFile
LoadLibraryW
user32
CharLowerBuffW
CharUpperBuffW
CharNextW
UnregisterClassA
MessageBoxA
oleaut32
VarBstrCat
VarBstrCmp
ole32
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
CoUninitialize
CoInitialize
CoCreateInstance
msvcr80
_lseek
memcpy
_wsopen_s
_wremove
malloc
free
wcsrchr
wcsstr
wcschr
memcpy_s
wcstol
towupper
towlower
wcsncmp
memset
_vsnwprintf
_recalloc
wprintf
wcsncpy_s
memmove_s
vswprintf_s
wcscpy_s
vsprintf_s
fclose
fwprintf_s
fopen_s
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
__winitenv
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_except_handler4_common
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_crt_debugger_hook
_invoke_watson
_controlfp_s
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_write
_read
_errno
_close
Sections
.text Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 653KB - Virtual size: 653KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE