Dism.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0e60d1675c9d0001883033fc1389f81a14def7b943ea4173c8c3324b6a6f965c_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0e60d1675c9d0001883033fc1389f81a14def7b943ea4173c8c3324b6a6f965c_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
0e60d1675c9d0001883033fc1389f81a14def7b943ea4173c8c3324b6a6f965c_NeikiAnalytics.exe
-
Size
225KB
-
MD5
4c712afa77e1b1ac4d519b7978480580
-
SHA1
38532d897d3306eff38866e37be497da991e0241
-
SHA256
0e60d1675c9d0001883033fc1389f81a14def7b943ea4173c8c3324b6a6f965c
-
SHA512
ee300d43114cb3098729f850acf132e6113e311e5295dac96aff1d5851540c768f32f2807804c22d17e413374e89a733362a84c7fb367253d47cd819a6c4ae39
-
SSDEEP
6144:BuJOFOZtXGRLDSvrqHBCaJmuAMLrJBSy:BaXGRci0aJmuAcUy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e60d1675c9d0001883033fc1389f81a14def7b943ea4173c8c3324b6a6f965c_NeikiAnalytics.exe
Files
-
0e60d1675c9d0001883033fc1389f81a14def7b943ea4173c8c3324b6a6f965c_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
03e927665fbd0297cac3a1489c3f1d69
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
PDB Paths
Imports
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
InitiateSystemShutdownExW
AddAce
InitializeAcl
GetSecurityDescriptorControl
MakeAbsoluteSD
GetSecurityDescriptorSacl
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
GetSecurityDescriptorOwner
InitializeSecurityDescriptor
GetLengthSid
IsValidSid
CopySid
GetAclInformation
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
GetSidSubAuthority
InitializeSid
GetSidLengthRequired
IsValidSecurityDescriptor
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
kernel32
OutputDebugStringW
SetConsoleCtrlHandler
SetErrorMode
GetStdHandle
GetConsoleMode
GetFileType
LocalFree
WriteFile
WideCharToMultiByte
LocalAlloc
WriteConsoleW
HeapAlloc
lstrlenW
GetModuleFileNameW
SetLastError
GetFileAttributesW
FormatMessageW
IsWow64Process
GetVersionExW
GetSystemInfo
LeaveCriticalSection
EnterCriticalSection
CompareStringW
GetDriveTypeW
GetProcessHeap
SearchPathW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
UnmapViewOfFile
GetLocaleInfoW
CreateFileMappingW
MapViewOfFile
LoadLibraryExW
FreeLibrary
GetProcAddress
LoadLibraryW
ExpandEnvironmentStringsW
GetSystemWindowsDirectoryW
GetModuleHandleExW
ReadFile
SetFilePointer
GetFullPathNameW
GetTempFileNameW
CreateFileW
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
OutputDebugStringA
InterlockedCompareExchange
MultiByteToWideChar
InterlockedExchange
HeapSize
HeapReAlloc
HeapDestroy
GetVersionExA
HeapFree
Sleep
RaiseException
GetCommandLineW
InitializeCriticalSection
DeleteCriticalSection
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
SetThreadUILanguage
SetEvent
InterlockedDecrement
InterlockedIncrement
GetCurrentThreadId
GetModuleHandleW
GetCurrentProcess
GetLastError
CloseHandle
msvcrt
_CxxThrowException
_wcsicmp
_vscwprintf
bsearch
_wcsnicmp
wcsncmp
wcsstr
wcschr
wprintf
_vsnwprintf
towupper
_isatty
_write
_lseeki64
_fileno
__pioinfo
__badioinfo
ferror
_itoa
_snprintf
_iob
isleadbyte
__mb_cur_max
mbtowc
_controlfp
memmove
memcpy
realloc
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
??1type_info@@UAE@XZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_callnewh
_wcslwr
_errno
__CxxFrameHandler
??0exception@@QAE@XZ
malloc
wcsrchr
calloc
__RTDynamicCast
_purecall
free
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
?what@exception@@UBEPBDXZ
??0exception@@QAE@ABQBD@Z
memset
_getwch
ntdll
RtlFreeHeap
RtlAllocateHeap
RtlUnwind
user32
UnregisterClassA
CharLowerBuffW
PostThreadMessageW
ole32
CoInitializeSecurity
CoCreateInstance
CoUninitialize
CoInitializeEx
oleaut32
GetErrorInfo
SysFreeString
SysAllocString
SysStringLen
LoadRegTypeLi
LoadTypeLi
VariantClear
SysAllocStringLen
SysAllocStringByteLen
SysStringByteLen
VarBstrCmp
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
Sections
.text Size: 149KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 40KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE