d:\dbs\el\nov\target\x86\ship\outlooksxs\x-none\olkfstub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2545c2fe20bdf030d18cb9f370c390e7469c14bc91499da5366088621361cb22_NeikiAnalytics.dll
Resource
win7-20240221-en
General
-
Target
2545c2fe20bdf030d18cb9f370c390e7469c14bc91499da5366088621361cb22_NeikiAnalytics.exe
-
Size
478KB
-
MD5
1d1fab506dff6bafbb922588ddd4de00
-
SHA1
f90967ef5cb775cf9ec2c4f668b5b2a8c6f56ffd
-
SHA256
2545c2fe20bdf030d18cb9f370c390e7469c14bc91499da5366088621361cb22
-
SHA512
7ac1c983e63d1b0d82e7a3982dff3711dbd7d27b168f8045c77e1ce6fe9406e6c02263e51e3335187a2e83116a330b52b29c4b75e676b6fc9c717c431e0e7481
-
SSDEEP
12288:KilUFILz9GrEESYtXvvinG4/K8FMdD2EpXv9rXB04:KilgILzMoEXtXvvinG4/hFMN2EpJXu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2545c2fe20bdf030d18cb9f370c390e7469c14bc91499da5366088621361cb22_NeikiAnalytics.exe
Files
-
2545c2fe20bdf030d18cb9f370c390e7469c14bc91499da5366088621361cb22_NeikiAnalytics.exe.dll windows:6 windows x86 arch:x86
7e84dc61b1941b22a21ae8136a91e629
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
SetLastError
GetFullPathNameW
lstrlenW
ExpandEnvironmentStringsW
GetFileAttributesW
GetSystemDirectoryW
GetModuleHandleA
GetLocaleInfoA
GetLastError
FreeLibrary
GetSystemInfo
GetCurrentDirectoryW
SetCurrentDirectoryW
GetProcAddress
GetModuleHandleW
LoadLibraryExW
GetCurrentProcess
DeleteCriticalSection
LoadLibraryExA
VirtualQuery
VirtualProtect
DisableThreadLibraryCalls
MultiByteToWideChar
GetACP
InitializeCriticalSection
GetModuleFileNameA
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleExW
TerminateProcess
RaiseException
ole32
ReadClassStg
CoGetMalloc
StgOpenStorage
advapi32
RegQueryValueExW
RegCloseKey
RegQueryValueA
RegOpenKeyExA
RegGetValueW
RegOpenKeyExW
vcruntime140
memset
__CxxFrameHandler3
_except_handler4_common
__std_type_info_destroy_list
wcsrchr
api-ms-win-crt-string-l1-1-0
wcscpy_s
wcsncpy_s
wcsncat_s
strncmp
wcsncmp
_stricmp
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vswprintf
__stdio_common_vswprintf_s
api-ms-win-crt-convert-l1-1-0
atoi
api-ms-win-crt-runtime-l1-1-0
_initialize_onexit_table
_seh_filter_dll
_cexit
_execute_onexit_table
_configure_narrow_argv
_initialize_narrow_environment
_initterm_e
_initterm
api-ms-win-crt-locale-l1-1-0
__initialize_lconv_for_unsigned_char
Exports
Exports
DllCanUnloadNow
DllGetClassObject
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 221KB - Virtual size: 221KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 234KB - Virtual size: 236KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ