C:\ForDev\sqlite3_c\test_sqlite3.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2d5f690ec01e5a4a402f8c8b348e8600_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2d5f690ec01e5a4a402f8c8b348e8600_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
2d5f690ec01e5a4a402f8c8b348e8600_NeikiAnalytics.exe
-
Size
2.8MB
-
MD5
2d5f690ec01e5a4a402f8c8b348e8600
-
SHA1
c6b6ab307e3aebcd1d727abe320f76cf198a2b3b
-
SHA256
d4f3d46fa6894d60cd4ba45f27b4b929506a6fbd6cfe221ef866679cffd59c93
-
SHA512
4c20be9605c36d47b42ae24e24dced270727f78a27308766ab81dc49fbcf17945c66f0f1be749763e3be1477a7950554a76600359ed538d639434eec80608949
-
SSDEEP
49152:sUn5C37D1uyQC3BEoIdWpJF0u60U8i1s5Z0:vn5u993PIw+H1sn0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d5f690ec01e5a4a402f8c8b348e8600_NeikiAnalytics.exe
Files
-
2d5f690ec01e5a4a402f8c8b348e8600_NeikiAnalytics.exe.exe windows:6 windows x64 arch:x64
538972a1decf0e21c3ba47c2ba93d68a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
TryEnterCriticalSection
LeaveCriticalSection
RaiseException
CloseHandle
GetCurrentThreadId
AreFileApisANSI
CreateFileA
CreateFileW
CreateFileMappingW
CreateMutexW
DeleteFileA
DeleteFileW
FlushFileBuffers
FormatMessageA
FormatMessageW
FreeLibrary
GetCurrentProcessId
GetDiskFreeSpaceA
GetDiskFreeSpaceW
GetFileAttributesA
GetFileAttributesW
GetFileAttributesExW
GetFileSize
GetFullPathNameA
GetFullPathNameW
GetLastError
GetProcAddress
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetTempPathA
GetTempPathW
GetTickCount
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
HeapValidate
HeapCompact
LoadLibraryA
LoadLibraryW
LocalFree
LockFile
LockFileEx
MapViewOfFile
MultiByteToWideChar
QueryPerformanceCounter
ReadFile
SetEndOfFile
SetFilePointer
Sleep
SystemTimeToFileTime
UnlockFile
UnlockFileEx
UnmapViewOfFile
WideCharToMultiByte
WriteFile
WaitForSingleObject
WaitForSingleObjectEx
OutputDebugStringA
OutputDebugStringW
GetProcessHeap
FlushViewOfFile
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
SetLastError
ReleaseMutex
GetFileType
GetStdHandle
VirtualAlloc
GetEnvironmentVariableA
VirtualFree
GetModuleHandleA
GetThreadLocale
SetEvent
CreateEventA
ExitThread
TerminateThread
CreateThread
SetConsoleCtrlHandler
SetErrorMode
GetACP
GetCommandLineA
OpenFileMappingA
CreateFileMappingA
IsBadReadPtr
GetHandleInformation
GetUserDefaultLangID
GetSystemDefaultLangID
GetTempFileNameA
GetFileInformationByHandle
CreateProcessA
SetThreadPriority
GetSystemDirectoryA
GetLocalTime
GetCurrentProcess
GetProcessTimes
GetCurrentThread
GetModuleHandleExA
VirtualQuery
OpenProcess
K32GetModuleFileNameExA
LoadLibraryExA
ReadConsoleW
HeapQueryInformation
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
RtlUnwindEx
InterlockedPushEntrySList
InterlockedFlushSList
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
EncodePointer
RtlPcToFileHeader
ExitProcess
TerminateProcess
GetModuleHandleExW
ResumeThread
FreeLibraryAndExitThread
GetModuleFileNameW
GetCommandLineW
WriteConsoleW
GetConsoleOutputCP
GetConsoleMode
SetStdHandle
QueryPerformanceFrequency
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileSizeEx
SetFilePointerEx
GetTimeZoneInformation
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
RtlUnwind
imagehlp
SymInitialize
SymCleanup
StackWalk64
Sections
.text Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 318KB - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 373B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.trace Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ