D:\dbs\sh\ddvsm\0128_230433\cmd\4o\out\binaries\x86ret\bin\i386\VsRegEdit.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d2fde0bb03817f188841204b0c930a40_NeikiAnalytics.exe
Resource
win7-20240220-en
General
-
Target
d2fde0bb03817f188841204b0c930a40_NeikiAnalytics.exe
-
Size
768KB
-
MD5
d2fde0bb03817f188841204b0c930a40
-
SHA1
39ea2d4988549ae5f5e16bc32816f774759dd39f
-
SHA256
aee2cdf658662a50277b300ccae68b592cd36ffdee0eb49f017519a6f296f2b3
-
SHA512
46ced0b91cc16dd0aad7c33cdbf6fd4158b34e37f045a80383409e4ce385ddf38466c83f8000ff1d718691122cf5655fee463bdc934201b43a9dbde840aa76c9
-
SSDEEP
12288:xmcpOSiWGPCcjuPsyjCKTlMTmkJR4Do07Y86gw5CtCjX+NLuFhNpBeZT3X:p4Wc9cPWSkQ/7Gb8NLEbeZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d2fde0bb03817f188841204b0c930a40_NeikiAnalytics.exe
Files
-
d2fde0bb03817f188841204b0c930a40_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
c76d36aa350b124608209cd41a5973e6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegQueryValueExW
RegEnumValueW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegEnumKeyExW
RegCreateKeyExW
RegDeleteKeyW
RegQueryInfoKeyW
RegCloseKey
CheckTokenMembership
AllocateAndInitializeSid
RegQueryInfoKeyA
RegEnumValueA
RegEnumKeyExA
RegDeleteTreeA
RegDeleteKeyValueW
RegDeleteKeyValueA
RegDeleteValueA
RegDeleteKeyExW
RegDeleteKeyExA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegLoadAppKeyW
RegDeleteTreeW
RegSaveKeyW
RegGetKeySecurity
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
RevertToSelf
ImpersonateLoggedOnUser
FreeSid
kernel32
VirtualFree
VirtualAlloc
FlushInstructionCache
SetThreadContext
GetThreadContext
ResumeThread
SuspendThread
VirtualQuery
FindResourceW
LoadResource
FindResourceExW
LockResource
FindClose
FindFirstFileW
SizeofResource
GetModuleHandleW
GetProcessHeap
DeleteCriticalSection
GetProcAddress
HeapDestroy
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionEx
GetModuleFileNameW
HeapFree
VirtualProtect
CreateDirectoryW
GetFileAttributesW
MoveFileW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
RtlUnwind
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetStdHandle
WriteFile
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetACP
CompareStringW
LCMapStringW
GetFileType
GetStringTypeW
GetCurrentThread
OutputDebugStringW
CloseHandle
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
CreateFileW
CreateMutexW
ReleaseMutex
WaitForSingleObject
LoadLibraryW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
FlushViewOfFile
GetTickCount
Sleep
GetFileAttributesExW
GetPrivateProfileStringW
VerSetConditionMask
VerifyVersionInfoW
CompareStringA
InitializeCriticalSection
CreateToolhelp32Snapshot
Thread32First
OpenThread
Thread32Next
HeapUnlock
GetVersionExW
HeapLock
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryEnterCriticalSection
shell32
SHGetFolderPathW
ole32
StringFromGUID2
CoTaskMemFree
CLSIDFromString
CoCreateGuid
StringFromCLSID
oleaut32
SysFreeString
SysAllocString
shlwapi
PathRemoveBackslashW
PathIsRootW
PathCombineW
PathRemoveFileSpecW
StrCmpIW
PathFileExistsW
PathAppendW
Sections
.text Size: 176KB - Virtual size: 175KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 576KB - Virtual size: 580KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE