e:\template_build\D129H02\B3329H02\ActiveX\build\bin\win32\release\tsdaemon.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c508b3619236025b4533bc8cf4c181b0_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
c508b3619236025b4533bc8cf4c181b0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
c508b3619236025b4533bc8cf4c181b0_NeikiAnalytics.exe
-
Size
90KB
-
MD5
c508b3619236025b4533bc8cf4c181b0
-
SHA1
796774fa84d443bea085cd98f9339e3512c66d17
-
SHA256
3e35845c3fa6d74cc3f9975a5bd360af07bf7c19c411425bf9f8f7ea4326fffb
-
SHA512
0168bda9264c55472878efb0fb41e593e0c8797fe9f1342bafadb20a00432bcaff7e3dae08105489c667f88b56f806922f1a15f6f17d40b591ad7068c20ec0fa
-
SSDEEP
1536:d91dALI469COOVXvXj2XKBLYE2PtBY0FrSZ:d91CLj4pOV/Xj2XKBL92VBY0dS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c508b3619236025b4533bc8cf4c181b0_NeikiAnalytics.exe
Files
-
c508b3619236025b4533bc8cf4c181b0_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
3713bc6cd886c0cf76cd48a048349d39
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc90u
ord6035
ord2206
ord2251
ord4747
ord6803
ord4173
ord6801
ord4423
ord4448
ord296
ord2702
ord2537
ord1108
ord1137
ord813
ord799
ord811
ord524
ord5167
ord5182
ord4512
ord2282
ord3577
ord2130
ord1357
ord2596
ord6666
ord1144
ord4774
ord6604
ord2069
ord3515
ord1599
ord3220
ord285
ord1607
ord4405
ord5979
ord5324
ord5008
ord2208
ord1810
ord1809
ord1675
ord3353
ord6408
ord1754
ord1751
ord4345
ord1492
ord4664
ord5602
ord2074
ord5512
ord6800
ord4603
ord5653
ord3743
ord4179
ord4702
ord1728
ord6466
ord5685
ord5683
ord960
ord965
ord969
ord967
ord971
ord2615
ord2635
ord2619
ord2625
ord2623
ord2621
ord2638
ord2633
ord2617
ord2640
ord2628
ord2610
ord2612
ord2630
ord2375
ord2368
ord1641
ord6802
ord4174
ord6804
ord3682
ord5404
ord6376
ord3226
ord1442
ord5625
ord2139
ord1792
ord1791
ord1727
ord5650
ord2771
ord2983
ord3112
ord4728
ord2966
ord1048
ord5548
ord6741
ord5830
ord4213
ord2087
ord3217
ord5674
ord5676
ord2447
ord4347
ord4996
ord5680
ord5663
ord6018
ord3115
ord3140
ord2774
ord2893
ord2764
ord4080
ord4081
ord4071
ord2891
ord4348
ord4910
ord4682
ord4000
ord2057
ord814
ord600
ord286
ord639
ord374
ord3794
ord4905
ord4681
ord3670
ord6482
ord4211
ord794
ord589
ord4043
ord4967
ord265
ord5632
ord5154
ord4631
ord1272
ord744
ord801
msvcr90
memset
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
wcstol
wcsrchr
sscanf_s
__CxxFrameHandler3
kernel32
QueryPerformanceCounter
WideCharToMultiByte
MultiByteToWideChar
OutputDebugStringW
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
CloseHandle
TerminateProcess
AttachConsole
SetConsoleCtrlHandler
GenerateConsoleCtrlEvent
FreeConsole
Process32NextW
CreateProcessW
FindFirstFileW
FindClose
GetPrivateProfileStringW
WritePrivateProfileStringW
Sleep
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
GetModuleFileNameW
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
WaitForSingleObject
ExitProcess
CreateThread
user32
DrawIcon
LoadMenuW
GetClientRect
GetCursorPos
GetSystemMetrics
IsIconic
SendMessageW
LoadIconW
EnableWindow
GetSubMenu
SetForegroundWindow
shell32
ShellExecuteExW
ShellExecuteW
Shell_NotifyIconW
msvcp90
?close@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?open@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXPBDHH@Z
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@XZ
?getline@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@PADH@Z
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??$?8DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
ws2_32
inet_addr
htons
socket
bind
select
__WSAFDIsSet
recvfrom
WSAStartup
WSACleanup
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ