C:\Users\PandaOS\documents\visual studio 2012\Projects\Justice\Release\Justice.pdb
Static task
static1
Behavioral task
behavioral1
Sample
39c0d7bdd1befd03bbc0b093858fd000_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
39c0d7bdd1befd03bbc0b093858fd000_NeikiAnalytics.exe
-
Size
154KB
-
MD5
39c0d7bdd1befd03bbc0b093858fd000
-
SHA1
d5fada35cd688cef51e71a292cd572cdd49b6110
-
SHA256
99e295bc5c8eba631483f78184eb05773eb3628e8570889036576df1add3fda6
-
SHA512
915459c6f235c85b4083d9f48a2fdeb565355fff3d1cf41f7bd43951d8dbe9ea5c90d8e4d766ee919da342ba45d887fa91fe32d516afcd59384eef51a7c27591
-
SSDEEP
3072:GZehu9aakInFGILeYpoYRS5CF/d7pqX68W8fV/xTPQahEa+:GwhuUI8k2YM5kvwEyQq1+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39c0d7bdd1befd03bbc0b093858fd000_NeikiAnalytics.exe
Files
-
39c0d7bdd1befd03bbc0b093858fd000_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
32275a6afcdcf7cc8031a0629a22ccd9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetDriveTypeA
FindFirstFileA
FindNextFileA
FindClose
GetModuleFileNameA
CreateFileA
GetFileSize
ReadFile
CloseHandle
WriteFile
SetFileAttributesA
ExitProcess
OutputDebugStringA
Sleep
CreateThread
WriteConsoleW
SetFilePointerEx
GetCommandLineW
IsDebuggerPresent
IsProcessorFeaturePresent
GetFileAttributesExW
GetLastError
HeapFree
EncodePointer
DecodePointer
InterlockedDecrement
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
MultiByteToWideChar
HeapAlloc
RaiseException
SetLastError
InterlockedIncrement
GetCurrentThreadId
GetStdHandle
GetModuleFileNameW
GetProcessHeap
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
OutputDebugStringW
LoadLibraryW
RtlUnwind
HeapSize
HeapReAlloc
WideCharToMultiByte
LCMapStringW
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
CreateFileW
shell32
ShellExecuteA
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE