t:\outlook\x86\ship\0\scanpst.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0672a85cd0985733d91ad2ca73e81990_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0672a85cd0985733d91ad2ca73e81990_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
0672a85cd0985733d91ad2ca73e81990_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
0672a85cd0985733d91ad2ca73e81990
-
SHA1
7766b0865f42f8279be81c48c1b9c9355cd4f6bd
-
SHA256
f5d283894d65cca18b5f3561f3f467fccca1e1e83366ad6ddf183cdabe55eb90
-
SHA512
9399afca45188dc39d4ccb2bbb7b584cec4c0a4f290f8a0c30bab9f383e9b89ab51fb1e041dd9b71482d4d8c9852726b8da7b8759a5c58154287314babe44bdf
-
SSDEEP
12288:4sU8+Tn6VMP5CPU6EkUw6XvV2NlLiwXmVmMdpx7TjLNFtA2byK9CTIb7a:4sv+L6VMRCPU6CENltmVVdpx7fLrQWd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0672a85cd0985733d91ad2ca73e81990_NeikiAnalytics.exe
Files
-
0672a85cd0985733d91ad2ca73e81990_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
0d9bdab8b3d52d309ed2895d7d10f0ee
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetTickCount
ReadFile
SetFilePointer
CreateFileW
GetVersionExA
FindClose
FindFirstFileW
GetFullPathNameW
GetCurrentThreadId
GetCommandLineW
GetSystemDirectoryW
LoadLibraryExW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
GetProcessHeap
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
VirtualProtect
GetCurrentProcess
CloseHandle
LoadLibraryA
SetErrorMode
lstrlenA
GetSystemDefaultLCID
lstrlenW
OutputDebugStringA
GetModuleFileNameW
SetLastError
GetLastError
GetVersion
GetFileAttributesW
GetProcAddress
GetModuleHandleW
LoadLibraryW
GetModuleHandleA
user32
UnhookWindowsHookEx
SetWindowsHookExA
RegisterWindowMessageA
LoadBitmapA
DestroyWindow
GetWindowPlacement
PostQuitMessage
DefWindowProcW
IsIconic
GetClassInfoW
SendMessageW
EnableMenuItem
GetWindowLongW
SetWindowLongW
SetClassLongA
GetDlgItemTextW
MessageBoxW
EnableWindow
SetForegroundWindow
BeginPaint
EndPaint
GetMessageA
CallNextHookEx
GetDC
ReleaseDC
GetClientRect
LoadStringW
ShowWindow
DialogBoxParamW
CreateWindowExW
RegisterClassW
GetParent
PostMessageA
CallWindowProcW
PeekMessageA
TranslateMessage
DispatchMessageA
FillRect
GetWindowTextA
SendMessageA
GetSysColor
MapWindowPoints
InvalidateRect
UpdateWindow
SetDlgItemTextW
GetWindowLongA
WinHelpA
IsDlgButtonChecked
EndDialog
SetWindowLongA
SendDlgItemMessageA
GetDlgItem
SetFocus
GetWindowRect
GetSystemMetrics
SetWindowPos
FindWindowW
LoadIconA
LoadCursorA
SetCursor
gdi32
GetPixel
DeleteDC
DeleteObject
SelectObject
BitBlt
SetTextColor
ExtTextOutA
CreateCompatibleBitmap
CreateCompatibleDC
Rectangle
GetStockObject
CreateSolidBrush
GetObjectA
LineTo
CreatePen
MoveToEx
SetBkColor
advapi32
RegQueryValueExW
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExW
olmapi32
ord259
scnpst32
RCVR_CountBlocks32@16
RCVR_Repair32@8
RCVR_Scan32@32
RCVR_Deinitialize32@0
RCVR_SetProgressCallbacks32@8
RCVR_Initialize32@8
scnpst64
RCVR_Initialize64@8
RCVR_SetProgressCallbacks64@8
RCVR_Deinitialize64@0
RCVR_Scan64@32
RCVR_Repair64@8
RCVR_CountBlocks64@16
msvcr80
_controlfp_s
_invoke_watson
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
_crt_debugger_hook
_except_handler4_common
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
memcpy
memset
_vsnwprintf
memmove
towupper
iswspace
_wtoi
_amsg_exit
Sections
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE