proquota.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1d808d4c4604758c962a9b8e68244dd0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1d808d4c4604758c962a9b8e68244dd0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1d808d4c4604758c962a9b8e68244dd0_NeikiAnalytics.exe
-
Size
75KB
-
MD5
1d808d4c4604758c962a9b8e68244dd0
-
SHA1
7bf0b847405aeb1ffd3be3a34874680ccc5de84a
-
SHA256
caec4aa003dbbd7d9ec752e0e5173f1ade2ce7579ac89e4a0a5c4bbf39b5145e
-
SHA512
4c05dff5b4f6e771f3e4402db3dba2728fc085af1ddaaf291b0f70172d67b60ceba5e1a434108eadb608ed80f72a286f2c490a995bbf8d1f31aaf37f9db6f082
-
SSDEEP
1536:S36hfZJxrl3Z3mSmMtlc8bXOyMVFVSrZPp90s7QfbNL5L2:UC7xF91mMt+IOyMVFVApYgQfjL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1d808d4c4604758c962a9b8e68244dd0_NeikiAnalytics.exe
Files
-
1d808d4c4604758c962a9b8e68244dd0_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
76421f84ba0108de00fe5a7b24c9257b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shell32
ord60
Shell_NotifyIconW
comctl32
ord17
advapi32
GetAce
RegNotifyChangeKeyValue
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
SetSecurityInfo
GetSecurityInfo
kernel32
FlushFileBuffers
GetEnvironmentStrings
GetSystemInfo
LocalFree
GetCurrentProcess
lstrcpyW
ExpandEnvironmentStringsW
LocalReAlloc
LocalAlloc
lstrlenW
FindNextFileW
CompareStringW
FindClose
lstrcmpiW
GetLastError
FindFirstFileW
SetLastError
LeaveCriticalSection
EnterCriticalSection
ExitThread
GetEnvironmentVariableW
SetEvent
FindCloseChangeNotification
Sleep
WaitForMultipleObjects
FindNextChangeNotification
CloseHandle
CreateEventW
FindFirstChangeNotificationW
ResumeThread
SetThreadPriority
CreateThread
WaitForSingleObject
InitializeCriticalSection
SetProcessShutdownParameters
OpenEventW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
GetProcAddress
GetModuleHandleA
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
VirtualProtect
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
SetFilePointer
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
GetLocaleInfoA
user32
LoadStringW
SendMessageW
SetWindowPos
GetDesktopWindow
GetParent
GetSystemMetrics
GetWindowLongW
GetWindowRect
SetForegroundWindow
CheckDlgButton
GetClientRect
EndDialog
PostMessageW
GetDlgItem
IsDlgButtonChecked
SendDlgItemMessageW
SetDlgItemTextW
KillTimer
SetTimer
LoadImageW
DialogBoxParamW
MessageBoxW
DefWindowProcW
LoadIconW
PostQuitMessage
DispatchMessageW
TranslateMessage
GetMessageW
CreateWindowExW
RegisterClassW
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE