dmscript.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8161c5a87299a360124807e88d655d10_NeikiAnalytics.dll
Resource
win10v2004-20240611-en
General
-
Target
8161c5a87299a360124807e88d655d10_NeikiAnalytics.exe
-
Size
235KB
-
MD5
8161c5a87299a360124807e88d655d10
-
SHA1
a9f836092dace0ad138da70b41d0634d38330c33
-
SHA256
272bb784d19418e7b536f68ce4a44b543faf4665219e5d430aff3e8414c0d3f0
-
SHA512
035ee28bad58dc6216ec955f1bad0ae7e598c8996ae90431d12733c58cc6376cba8c355d46d78b1a2e53ff61b3893b97976f7ccdea5e62c089bbc70ca818e64f
-
SSDEEP
6144:Dk+tXpC5JFWTfMub8WjQYj6A0zihp0MBtw:BtZETWToWj56Ay2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8161c5a87299a360124807e88d655d10_NeikiAnalytics.exe
Files
-
8161c5a87299a360124807e88d655d10_NeikiAnalytics.exe.dll regsvr32 windows:10 windows x86 arch:x86
30127a81532cf2a9aac62ad6117446b7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntdll
wcstoul
_ultow
wcstombs
iswascii
memset
RtlUnwind
_wcsicmp
_stricmp
tolower
wcsstr
_CIpow
_CIsqrt
_alldiv
_ftol2_sse
_alloca_probe
msvcrt
memcpy
malloc
_beginthreadex
_endthreadex
_purecall
??0exception@@QAE@ABQBD@Z
_CxxThrowException
?what@exception@@UBEPBDXZ
memmove
??0exception@@QAE@ABQBDH@Z
??0exception@@QAE@ABV0@@Z
??1type_info@@UAE@XZ
??3@YAXPAX@Z
_onexit
__dllonexit
??_V@YAXPAX@Z
_unlock
_lock
_initterm
free
_amsg_exit
_XcptFilter
__CxxFrameHandler3
_callnewh
??1exception@@UAE@XZ
api-ms-win-core-com-l1-1-0
CLSIDFromProgID
StringFromCLSID
CoTaskMemFree
CoUninitialize
CoInitializeEx
CoCreateInstance
api-ms-win-core-processthreads-l1-1-0
GetCurrentProcess
GetCurrentProcessId
TerminateProcess
GetCurrentThreadId
api-ms-win-core-sysinfo-l1-1-0
GetTickCount
GetSystemTimeAsFileTime
api-ms-win-core-registry-l1-1-0
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
api-ms-win-core-libraryloader-l1-2-0
DisableThreadLibraryCalls
GetModuleFileNameA
GetProcAddress
api-ms-win-core-synch-l1-1-0
LeaveCriticalSection
EnterCriticalSection
CreateEventA
SetEvent
WaitForSingleObject
InitializeCriticalSection
DeleteCriticalSection
api-ms-win-core-libraryloader-l1-2-1
LoadLibraryA
api-ms-win-core-string-obsolete-l1-1-0
lstrlenA
api-ms-win-core-registry-l2-1-0
RegEnumKeyA
RegDeleteKeyA
api-ms-win-core-string-l1-1-0
WideCharToMultiByte
MultiByteToWideChar
api-ms-win-core-handle-l1-1-0
CloseHandle
api-ms-win-core-synch-l1-2-0
Sleep
api-ms-win-core-errorhandling-l1-1-0
UnhandledExceptionFilter
SetUnhandledExceptionFilter
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 144KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ