slui.pdb
Static task
static1
Behavioral task
behavioral1
Sample
021ee64cb714feb1d9bfb28f7c5f6fb0_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
021ee64cb714feb1d9bfb28f7c5f6fb0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
021ee64cb714feb1d9bfb28f7c5f6fb0_NeikiAnalytics.exe
-
Size
345KB
-
MD5
021ee64cb714feb1d9bfb28f7c5f6fb0
-
SHA1
0f47021537fb859013de475bfd32e498ba41ae44
-
SHA256
d23443cd75a8a08a0322d26bc71a9d61e88976167537ec80785ba17f2f160476
-
SHA512
4992894ed402aff1114a9ea1ed1d7fc952cc992138804b5402991e0f7fb61836a28579248aa60c0022b1cdf0d3c153783c06fc9cc3746a0e422229d5965452af
-
SSDEEP
6144:GB9qIcABOj/bRqY/W5R02qO7VKCyWQVe:GB9qIc0O79q3nyQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 021ee64cb714feb1d9bfb28f7c5f6fb0_NeikiAnalytics.exe
Files
-
021ee64cb714feb1d9bfb28f7c5f6fb0_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
dbd70b65a2f9eb303a399cf77d6adcce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
TraceMessage
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
DeregisterEventSource
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
RegisterTraceGuidsW
RegDeleteKeyW
ReportEventW
RegisterEventSourceW
RegCreateKeyExW
RegEnumKeyW
RegQueryInfoKeyW
RegSetValueExW
RegSetKeySecurity
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegDeleteValueW
FreeSid
LsaClose
LsaFreeMemory
CheckTokenMembership
AllocateAndInitializeSid
LsaQueryInformationPolicy
LsaOpenPolicy
kernel32
HeapAlloc
GetProcessHeap
HeapFree
GetLastError
VirtualQuery
LockResource
LoadResource
FindResourceExW
LeaveCriticalSection
EnterCriticalSection
EncodePointer
DecodePointer
CloseHandle
UnregisterWaitEx
HeapSetInformation
InterlockedIncrement
WaitForSingleObject
LocalFree
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
SetEvent
InterlockedDecrement
CreateEventW
RegisterApplicationRestart
RegisterWaitForSingleObject
InterlockedCompareExchange
FreeLibrary
GetProcAddress
GetModuleHandleExW
SetLastError
GetSystemTime
SystemTimeToFileTime
LoadLibraryW
FreeLibraryAndExitThread
SetThreadPriority
GetCurrentThread
CreateThread
GetModuleHandleW
GetCommandLineW
DeleteCriticalSection
CheckElevationEnabled
FormatMessageW
ExpandEnvironmentStringsW
LoadLibraryExW
GetVersionExW
LocalAlloc
GetSystemDirectoryW
GetUserDefaultLCID
Sleep
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
InterlockedExchange
user32
SetCursor
SendMessageW
SetSysColors
SystemParametersInfoW
GetSysColor
MessageBoxW
GetDesktopWindow
CallWindowProcW
SetForegroundWindow
GetMessageW
TranslateMessage
DispatchMessageW
LoadIconW
CopyIcon
LoadCursorW
CreateWindowExW
DefWindowProcW
GetCursorPos
KillTimer
PostQuitMessage
SetTimer
GetWindowLongW
DestroyIcon
DestroyWindow
SetWindowLongW
PostMessageW
AllowSetForegroundWindow
RegisterClassW
msvcrt
_controlfp
swscanf_s
memcpy
_except_handler4_common
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
towlower
towupper
_purecall
memmove
_vsnwprintf
memset
_wcsicmp
wcsstr
_wtoi
_waccess_s
wcschr
__getmainargs
_cexit
_exit
sppcommdlg
SLUXActivationWizard
winbrand
BrandingLoadString
ntdll
WinSqmAddToStream
ole32
StringFromGUID2
CoAllowSetForegroundWindow
CoRegisterClassObject
CoResumeClassObjects
CoMarshalInterThreadInterfaceInStream
CoReleaseServerProcess
CoSuspendClassObjects
CoUninitialize
CoInitializeEx
CoAddRefServerProcess
CoCreateInstance
CoRevokeClassObject
CoGetInterfaceAndReleaseStream
CoInitializeSecurity
oleaut32
UnRegisterTypeLi
RegisterTypeLi
LoadTypeLi
VariantTimeToSystemTime
SysAllocString
SysFreeString
rpcrt4
I_RpcMapWin32Status
UuidFromStringW
RpcStringFreeW
UuidToStringW
shell32
Shell_NotifyIconW
CommandLineToArgvW
ShellExecuteExW
slc
SLRegisterWindowsEvent
SLClose
SLOpen
SLUnregisterWindowsEvent
Sections
.text Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 229KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE