C:\BuildAgent\work\70e04e42d8888b\Release\Extractor.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1a137cb7a5ae569b32c66925534964259273fda43d2cc8ea2615316e2994db18_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1a137cb7a5ae569b32c66925534964259273fda43d2cc8ea2615316e2994db18_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1a137cb7a5ae569b32c66925534964259273fda43d2cc8ea2615316e2994db18_NeikiAnalytics.exe
-
Size
2.8MB
-
MD5
1cf5d8a27144ca57a524dbaa50f05570
-
SHA1
613a01f575ad66abfcd6fd5a8d33e1c73c81edc4
-
SHA256
1a137cb7a5ae569b32c66925534964259273fda43d2cc8ea2615316e2994db18
-
SHA512
3bbc0f32d7f5fb48590acce3ed874c3fa7aef7d5202a12ad0f70623096985d2f811613c4b317f4167bfdc1737cca28a29187e5084be9d423dca8ca5ee47eea01
-
SSDEEP
49152:XEVos7emBImRU9TrJW8ILvkbvrJnGfKLtUBCEiVDI8JBHFsAyUYjBcHQWGvUFR3p:XEVos7emBI4OrJW8frtuK43HFcwEFR3o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1a137cb7a5ae569b32c66925534964259273fda43d2cc8ea2615316e2994db18_NeikiAnalytics.exe
Files
-
1a137cb7a5ae569b32c66925534964259273fda43d2cc8ea2615316e2994db18_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
8b47557969e7d8b9ac8b3c79e6d25803
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
WSASetLastError
getaddrinfo
WSAStartup
send
connect
WSASocketW
gethostname
recv
WSAGetLastError
freeaddrinfo
setsockopt
inet_ntop
htonl
WSACleanup
closesocket
WSASend
shutdown
wininet
HttpAddRequestHeadersA
HttpOpenRequestA
InternetCloseHandle
InternetReadFile
InternetConnectA
InternetOpenA
HttpSendRequestA
iphlpapi
GetAdaptersAddresses
shlwapi
PathFileExistsA
version
VerQueryValueA
GetFileVersionInfoExW
GetFileVersionInfoSizeExW
gdiplus
GdipCreateBitmapFromStreamICM
GdipAlloc
GdipCloneImage
GdipDisposeImage
GdipGetImageWidth
GdipGetImageHeight
GdipCreateFromHDC
GdipDeleteGraphics
GdipCreatePen1
GdipDeletePen
GdipDrawRectangleI
GdipDrawImageRectI
GdiplusStartup
GdiplusShutdown
GdipCreateBitmapFromStream
GdipFree
kernel32
SetEndOfFile
ReadConsoleW
SetFilePointerEx
FlushFileBuffers
GetConsoleCP
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
HeapReAlloc
GetACP
GetTimeZoneInformation
GetCommandLineA
GetModuleFileNameA
ExitThread
SetStdHandle
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFullPathNameA
GetDriveTypeW
GetModuleHandleExW
ExitProcess
RtlUnwind
GetCommandLineW
LoadLibraryW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualFree
VirtualProtect
VirtualAlloc
GetVersionExW
LoadLibraryExW
GetModuleFileNameW
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
SetFilePointer
SystemTimeToFileTime
GetFileAttributesA
CreateFileA
CloseHandle
ReadFile
GetCurrentDirectoryA
LocalFileTimeToFileTime
CreateDirectoryA
WriteFile
SetFileTime
GetModuleHandleA
FindResourceA
SizeofResource
LoadResource
LockResource
FindFirstFileExA
FreeResource
LocalFree
VerSetConditionMask
VerifyVersionInfoW
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
GetProductInfo
FormatMessageA
GetLastError
GetExitCodeProcess
WaitForSingleObject
MoveFileA
GlobalAlloc
GlobalLock
GlobalFree
GlobalUnlock
MulDiv
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
GetStdHandle
OutputDebugStringA
FlsSetValue
QueryPerformanceFrequency
QueryPerformanceCounter
FlsFree
FlsAlloc
IsDebuggerPresent
GetCurrentThreadId
Sleep
SwitchToThread
WriteConsoleA
GetConsoleMode
GetFileType
AllocConsole
GetCurrentProcessId
GetCurrentProcess
UnlockFile
LockFileEx
VerifyVersionInfoA
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
CreateThread
SignalObjectAndWait
CreateTimerQueue
GetStartupInfoW
InitializeSListHead
ResetEvent
SetEvent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
GetTickCount
FindNextFileA
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
HeapSize
WriteConsoleW
LocalAlloc
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CreateEventW
InitializeCriticalSectionAndSpinCount
FormatMessageW
WideCharToMultiByte
GetCurrentDirectoryW
CreateDirectoryW
CreateFileW
DeleteFileW
FindClose
FindFirstFileExW
GetFileAttributesExW
GetFileInformationByHandle
GetFullPathNameW
AreFileApisANSI
SetLastError
GetModuleHandleW
GetProcAddress
MoveFileExW
MultiByteToWideChar
DuplicateHandle
WaitForSingleObjectEx
GetCurrentThread
GetExitCodeThread
GetNativeSystemInfo
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
RaiseException
user32
LoadStringA
MessageBoxA
SetWindowLongA
RegisterClassA
DispatchMessageA
TranslateMessage
GetMessageA
ShowWindow
DefWindowProcA
PostQuitMessage
SendMessageA
EndPaint
FillRect
GetDialogBaseUnits
CreateWindowExA
GetWindowLongA
SetWindowPos
GetWindowRect
GetDesktopWindow
GetSystemMetrics
BeginPaint
advapi32
GetTokenInformation
DeregisterEventSource
RegCloseKey
RegCreateKeyExA
CopySid
ReportEventA
RegSetValueExA
OpenProcessToken
GetLengthSid
RegisterEventSourceA
shell32
SHGetFileInfoA
SHFileOperationA
ShellExecuteExA
ole32
CreateStreamOnHGlobal
CoCreateGuid
Sections
.text Size: 980KB - Virtual size: 979KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 236KB - Virtual size: 235KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ