E:\Sx\SxN-VS2022\V25\SxN64.VS2022\IPCTestClient\URelease64\IPCTestClient.pdb
Static task
static1
Behavioral task
behavioral1
Sample
796beab7941b3fea4e1c6cd37431a5b0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
796beab7941b3fea4e1c6cd37431a5b0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
796beab7941b3fea4e1c6cd37431a5b0_NeikiAnalytics.exe
-
Size
152KB
-
MD5
796beab7941b3fea4e1c6cd37431a5b0
-
SHA1
89b618e54f98e026ddfaae30a33a44c676bae3e2
-
SHA256
3b09af58504b0237ff57f511bcf2b6145c5438fa103d2fc2ca02b7149ddc6518
-
SHA512
b4306bc4a8a1cdd011c73f82a54716fad29f76eb9a544060bcc1ee85fac59054254b60f518bb794c0fce9fab9894203fa94ea84373d591925517161afffd3f3d
-
SSDEEP
3072:ok+cSbXR4pqMqKRl1/uWvWw70BmsA6pD+XL/YAPX7+CLKL0b+:oZGnbWwPsAfL/YA/bc0b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 796beab7941b3fea4e1c6cd37431a5b0_NeikiAnalytics.exe
Files
-
796beab7941b3fea4e1c6cd37431a5b0_NeikiAnalytics.exe.exe windows:6 windows x64 arch:x64
f95a7114346a404af18198580af4f307
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
jetbyteipcdll
?AllocateAndAdd@CMessageBufferBuilder@IPC@JetByteTools@@UEAAXAEBV?$CArray@V?$CStringT@_WV?$StrTraitMFC_DLL@_WV?$ChTraitsCRT@_W@ATL@@@@@ATL@@V12@@@@Z
?AllocateAndAdd@CMessageBufferBuilder@IPC@JetByteTools@@UEAAXAEBV?$CStringT@_WV?$StrTraitMFC_DLL@_WV?$ChTraitsCRT@_W@ATL@@@@@ATL@@@Z
?AllocateAndAdd@CMessageBufferBuilder@IPC@JetByteTools@@UEAAX_N@Z
??0CResponseBuffer@IPC@JetByteTools@@QEAA@XZ
??1CResponseBuffer@IPC@JetByteTools@@QEAA@XZ
?GetMessageLength@CMessageBufferDeblocker@IPC@JetByteTools@@UEBAKXZ
?GetBool@CMessageBufferDeblocker@IPC@JetByteTools@@UEBA_NXZ
?GetString@CMessageBufferDeblocker@IPC@JetByteTools@@UEBA?AV?$CStringT@_WV?$StrTraitMFC_DLL@_WV?$ChTraitsCRT@_W@ATL@@@@@ATL@@XZ
?GetUnsignedLong@CMessageBufferDeblocker@IPC@JetByteTools@@UEBAKXZ
??1CMessagePostingClientCallback@IPC@JetByteTools@@QEAA@XZ
??1IReportErrors@IPC@JetByteTools@@IEAA@XZ
??0CMessagePostingClientCallback@IPC@JetByteTools@@QEAA@XZ
??1CMessageBufferBuilder@IPC@JetByteTools@@QEAA@XZ
?WM_ON_ASYNC_MESSAGE@CMessagePostingClientCallback@IPC@JetByteTools@@2KB
?WM_ON_DISCONNECT@CMessagePostingClientCallback@IPC@JetByteTools@@2KB
?Connect@CMessagePostingClientCallback@IPC@JetByteTools@@QEAAXPEAUHWND__@@_K@Z
??0CMessageBufferDeblocker@IPC@JetByteTools@@QEAA@AEBVIMessage@12@@Z
??1CMessageBufferDeblocker@IPC@JetByteTools@@QEAA@XZ
?Get@CMessageBufferDeblocker@IPC@JetByteTools@@UEBAXAEAV?$CArray@V?$CStringT@_WV?$StrTraitMFC_DLL@_WV?$ChTraitsCRT@_W@ATL@@@@@ATL@@V12@@@@Z
??1CClient@IPC@JetByteTools@@QEAA@XZ
??0CClient@IPC@JetByteTools@@QEAA@AEAVIClientCallback@12@AEBV?$CStringT@_WV?$StrTraitMFC_DLL@_WV?$ChTraitsCRT@_W@ATL@@@@@ATL@@G@Z
?OnConnect@CMessagePostingClientCallback@IPC@JetByteTools@@UEAAXXZ
?OnAsynchronousMessage@CMessagePostingClientCallback@IPC@JetByteTools@@UEAAXAEBVIAsynchronousMessage@23@@Z
?OnDisconnect@CMessagePostingClientCallback@IPC@JetByteTools@@UEAAXXZ
??0IReportErrors@IPC@JetByteTools@@QEAA@XZ
?WM_ON_CONNECT@CMessagePostingClientCallback@IPC@JetByteTools@@2KB
??0CMessageBufferBuilder@IPC@JetByteTools@@QEAA@XZ
mfc140u
ord11902
ord6729
ord10691
ord8947
ord3173
ord13513
ord11944
ord11940
ord1700
ord1722
ord1748
ord1734
ord1755
ord4776
ord4843
ord4788
ord4806
ord4800
ord4794
ord4853
ord4837
ord4782
ord4859
ord4814
ord4752
ord4767
ord4828
ord4360
ord9384
ord4352
ord2967
ord14211
ord7651
ord7650
ord6631
ord11406
ord13354
ord5723
ord2629
ord11806
ord3812
ord3279
ord3278
ord3172
ord11850
ord5582
ord5916
ord9946
ord6342
ord990
ord1503
ord8161
ord2344
ord296
ord2187
ord2212
ord3599
ord3697
ord3684
ord3598
ord10163
ord4725
ord3713
ord878
ord1369
ord10727
ord4656
ord14128
ord1489
ord8449
ord266
ord14278
ord12087
ord261
ord265
ord1501
ord6285
ord8656
ord11854
ord8830
ord2697
ord13397
ord6000
ord3071
ord3307
ord3308
ord11085
ord10704
ord8731
ord11813
ord6505
ord2370
ord14216
ord9089
ord4011
ord3949
ord12625
ord7668
ord2011
ord11664
ord11665
ord14088
ord12212
ord7719
ord14288
ord6121
ord14290
ord6123
ord14289
ord6122
ord3731
ord5706
ord11921
ord11929
ord4445
ord7920
ord10124
ord11933
ord11901
ord12606
ord5080
ord5363
ord5552
ord9041
ord5339
ord5555
ord5083
ord5229
ord5062
ord7460
ord7461
ord7450
ord5227
ord7922
ord9941
ord8900
ord6614
ord1157
ord1089
ord3951
ord13545
ord7716
ord1450
ord983
ord7393
ord10070
ord14209
ord5709
ord285
ord2921
ord280
ord1033
ord11625
ord3718
ord11771
ord8822
ord11415
ord11414
ord5451
ord9979
ord9975
ord9977
ord9978
ord9976
ord14360
ord2698
ord7913
ord3209
ord3212
ord13401
ord6002
ord3096
ord4083
ord8440
ord2907
ord3748
ord14194
ord2689
ord7233
ord446
ord8167
ord8084
ord12544
ord8023
ord5183
ord2439
ord12222
ord12223
ord8901
ord14210
ord286
ord1491
ord14217
kernel32
OutputDebugStringW
InitializeCriticalSectionAndSpinCount
GetLastError
DeleteCriticalSection
ReleaseSRWLockExclusive
TerminateProcess
GetCurrentProcess
GetModuleHandleW
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
user32
LoadIconW
GetSystemMenu
AppendMenuW
EnableWindow
GetSystemMetrics
GetClientRect
DrawIcon
IsIconic
SendMessageW
comctl32
InitCommonControlsEx
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__C_specific_handler
__current_exception
__current_exception_context
memset
memcpy
api-ms-win-crt-runtime-l1-1-0
_initialize_onexit_table
_crt_atexit
_register_thread_local_exe_atexit_callback
_c_exit
_invalid_parameter_noinfo_noreturn
_exit
exit
_initterm_e
_initterm
_get_wide_winmain_command_line
_initialize_wide_environment
_configure_wide_argv
_register_onexit_function
_set_app_type
_seh_filter_exe
_errno
_invalid_parameter_noinfo
terminate
_cexit
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ