D:\builds\build-sourcemod-msvc12\windows-1.12\OUTPUT\sourcepawn\libsourcepawn\windows-x86_64\libsourcepawn.pdb
Static task
static1
Behavioral task
behavioral1
Sample
60174bb160f1b67e818293d1d020d820_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
60174bb160f1b67e818293d1d020d820_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
60174bb160f1b67e818293d1d020d820_NeikiAnalytics.exe
-
Size
662KB
-
MD5
60174bb160f1b67e818293d1d020d820
-
SHA1
77d7d51f19433dc9c6ea8fdd6603746e72531cf3
-
SHA256
b952f836ad664cd9e39fbaba092acdbe2e3e36c8283f01b5b1ec63db60af4be8
-
SHA512
14dfa12e5d841c184b33266008e34586b7f0d242f16a461f2b941d44e7dda10e878472aaa0d05b2043ff6daaba40521cef8b6d2aaca4ebbc73652ef146422998
-
SSDEEP
12288:gLVPHQ/tCGsYcNd+2X73sVosvJQ0aoYxlTIlv/+ES0sOBzjBmvFxCmeL4eamg4lw:gLVPHQ/tCGs5Nd+2X73sVoshk4j+8iop
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 60174bb160f1b67e818293d1d020d820_NeikiAnalytics.exe
Files
-
60174bb160f1b67e818293d1d020d820_NeikiAnalytics.exe.dll windows:6 windows x64 arch:x64
b56d340a03d9cc090b8ae6f7045862d4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetSystemInfo
VirtualAlloc
VirtualFree
GetCurrentThread
FreeLibrary
GetProcAddress
LoadLibraryA
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
TryEnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
QueryPerformanceCounter
CloseHandle
WaitForSingleObjectEx
GetExitCodeThread
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
WideCharToMultiByte
MultiByteToWideChar
GetSystemTimeAsFileTime
GetModuleHandleW
EncodePointer
DecodePointer
LCMapStringEx
GetLocaleInfoEx
GetStringTypeW
CompareStringEx
GetCPInfo
GetCurrentProcessId
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
RtlUnwindEx
RtlPcToFileHeader
RaiseException
InterlockedFlushSList
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ReadFile
ExitProcess
GetModuleFileNameW
HeapFree
HeapAlloc
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetFileType
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
HeapReAlloc
GetTimeZoneInformation
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
FlushFileBuffers
WriteFile
GetConsoleOutputCP
SetStdHandle
CreateFileW
HeapSize
SetEndOfFile
WriteConsoleW
Exports
Exports
GetSourcePawnFactory
Sections
.text Size: 489KB - Virtual size: 489KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 134KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ