D:\qb\workspace\21461\source\output\dump32\d3d9\Imola\Release\igdumdim32.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c2aac4eec5aea4a36c7c55a437dfabe0_NeikiAnalytics.dll
Resource
win10v2004-20240611-en
General
-
Target
c2aac4eec5aea4a36c7c55a437dfabe0_NeikiAnalytics.exe
-
Size
2.6MB
-
MD5
c2aac4eec5aea4a36c7c55a437dfabe0
-
SHA1
0c6196e98db080d94a9b5e4ce28b825797c8c45a
-
SHA256
965ce5de6c705c1dd820057a342203d1c540e38b2d60f076d1c725ecfd9af1bd
-
SHA512
da5465c905ff8f630b49bb4753a1dcda315ef94dbc2521e1488f39050244d9512f32cc4673666786e601360c4db034e9644b1281f46aeee8e28ac7c6d8359e46
-
SSDEEP
49152:M7Ft46Om2VnhubbRxZ7T0tt3JHWdnY8Td1kdl+N6Aa2X18R049DtaJ/1vjViWNF0:MbysFxh0tGdnY8Td1kfT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c2aac4eec5aea4a36c7c55a437dfabe0_NeikiAnalytics.exe
Files
-
c2aac4eec5aea4a36c7c55a437dfabe0_NeikiAnalytics.exe.dll windows:10 windows x86 arch:x86
a7e43b8b781995d660362ba70d4a0f77
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
CloseHandle
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleW
GetModuleFileNameA
GetCurrentProcess
GetCurrentApplicationUserModelId
TryAcquireSRWLockExclusive
InitOnceExecuteOnce
LoadLibraryExA
EnterCriticalSection
LeaveCriticalSection
Sleep
GetProcAddress
GetCurrentProcessId
GetModuleHandleA
GetSystemInfo
CreateThreadpool
SetThreadpoolThreadMaximum
CloseThreadpool
CreateThreadpoolCleanupGroup
CloseThreadpoolCleanupGroupMembers
CloseThreadpoolCleanupGroup
CreateThreadpoolWork
SubmitThreadpoolWork
WaitForThreadpoolWorkCallbacks
QueryPerformanceCounter
ReleaseSemaphore
WaitForSingleObjectEx
CreateSemaphoreExW
FreeLibrary
WakeAllConditionVariable
SleepConditionVariableSRW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
TerminateProcess
CreateFileW
FindClose
FindFirstFileExW
FindNextFileW
GetLastError
MultiByteToWideChar
WideCharToMultiByte
GetSystemTimePreciseAsFileTime
RaiseException
RtlUnwind
InterlockedFlushSList
SetLastError
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
EncodePointer
InitializeCriticalSectionEx
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetCPInfo
HeapFree
HeapAlloc
DecodePointer
HeapReAlloc
HeapSize
HeapQueryInformation
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
LCMapStringW
GetProcessHeap
GetStdHandle
GetFileType
GetStringTypeW
SetFilePointerEx
SetStdHandle
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
WriteConsoleW
advapi32
RegCloseKey
EventUnregister
EventRegister
RegQueryValueExA
RegOpenKeyExA
EventWrite
user32
PostThreadMessageW
IsChild
GetAsyncKeyState
SetWindowTextA
SetWindowTextW
TranslateMessage
MessageBoxW
EnumChildWindows
EnumDisplayDevicesW
GetDisplayConfigBufferSizes
QueryDisplayConfig
SetProcessDPIAware
DispatchMessageW
GetWindowRect
GetMessageW
ole32
OleRun
shell32
SHGetKnownFolderPath
ntdll
RtlAnsiStringToUnicodeString
RtlFreeUnicodeString
RtlInitAnsiString
Exports
Exports
OpenAdapter
Sections
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 323KB - Virtual size: 322KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 220KB - Virtual size: 235KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 222KB - Virtual size: 222KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ