rundll32.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0631d087e979b4af12acf6a25f9c959066e449c5a568316f8980e97fa4601ffd_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0631d087e979b4af12acf6a25f9c959066e449c5a568316f8980e97fa4601ffd_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
0631d087e979b4af12acf6a25f9c959066e449c5a568316f8980e97fa4601ffd_NeikiAnalytics.exe
-
Size
58KB
-
MD5
b323ef02c4b3b837338765cfefbbb440
-
SHA1
93f8fc3ae90a84413b9f81481f88683d2fd128dc
-
SHA256
0631d087e979b4af12acf6a25f9c959066e449c5a568316f8980e97fa4601ffd
-
SHA512
1aea3934faa06b8ea0fe8f043c8e8a92ee4ae24962300f0452ef2040cc2bb40db1ce4e2007cd730602e57f641b30f164928cfc82b523785bc74721871b8442db
-
SSDEEP
768:ivAOQbSEln5IyYpamDjobj8ShSrH92v/sP7arcWo2yH9qNmtXE:t9ln5IUmDjoX9S796OQtrY9qGU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0631d087e979b4af12acf6a25f9c959066e449c5a568316f8980e97fa4601ffd_NeikiAnalytics.exe
Files
-
0631d087e979b4af12acf6a25f9c959066e449c5a568316f8980e97fa4601ffd_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
d8fc1a3614d526e7111f36ddb837bb41
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_except_handler3
_wtoi
_vsnwprintf
kernel32
FreeLibrary
LocalFree
lstrlenA
WideCharToMultiByte
LocalAlloc
lstrlenW
GetProcAddress
FormatMessageW
GetLastError
LoadLibraryW
ActivateActCtx
CreateActCtxW
SearchPathW
GetFileAttributesW
ReleaseActCtx
DeactivateActCtx
SetErrorMode
ExitProcess
GetModuleHandleW
GetStartupInfoW
GetCommandLineW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
gdi32
GetStockObject
user32
RegisterClassW
LoadStringW
CharNextW
SetClassLongW
LoadIconW
DefWindowProcW
CreateWindowExW
MessageBoxW
LoadCursorW
DestroyWindow
imagehlp
ImageDirectoryEntryToData
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE