64BitMAPIBroker.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0693d7074eda765729de5e45ad8d64912b3728f3049cf77231e2ebe8c4c2a2a7_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0693d7074eda765729de5e45ad8d64912b3728f3049cf77231e2ebe8c4c2a2a7_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
0693d7074eda765729de5e45ad8d64912b3728f3049cf77231e2ebe8c4c2a2a7_NeikiAnalytics.exe
-
Size
1.7MB
-
MD5
107d5fc360de053e1dabc4e158f0b940
-
SHA1
44ce9b414d348762b971f8e5e64cc34ca94d10b8
-
SHA256
0693d7074eda765729de5e45ad8d64912b3728f3049cf77231e2ebe8c4c2a2a7
-
SHA512
2f390c9ef8d693162f9e56f80fc1855275886c7e3d96555a9fc21b7fe5d0fbdad10c1f8e1208ee092055368e38e503bc3d1bf0df07c2aac2fb7a7f1e42bb5854
-
SSDEEP
24576:GlB2iD6gCks7WE9F5pwg8zmdqQjC60jiHkU:G1D6gCks7R9L58UqFJjskU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0693d7074eda765729de5e45ad8d64912b3728f3049cf77231e2ebe8c4c2a2a7_NeikiAnalytics.exe
Files
-
0693d7074eda765729de5e45ad8d64912b3728f3049cf77231e2ebe8c4c2a2a7_NeikiAnalytics.exe.exe windows:6 windows x64 arch:x64
aa2d4576e56ca6c8c1adebb99352b14c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetLastError
SetEvent
CloseHandle
CreateThread
ResetEvent
GetProcAddress
LocalFree
DeleteCriticalSection
GetCurrentProcessId
GetModuleHandleW
TransactNamedPipe
GetFileType
CreateEventA
WaitNamedPipeW
ConnectNamedPipe
LocalAlloc
GetCurrentThreadId
VerSetConditionMask
VerifyVersionInfoW
SleepConditionVariableCS
InitializeCriticalSectionEx
RaiseException
CreateNamedPipeA
WaitForMultipleObjects
DisconnectNamedPipe
OpenProcess
GetOverlappedResult
FlushFileBuffers
WakeAllConditionVariable
WakeConditionVariable
InitializeConditionVariable
LoadLibraryA
FreeLibrary
WideCharToMultiByte
GetCommandLineA
Sleep
CreateFileW
WaitForSingleObject
CreateMutexW
WriteConsoleW
GetConsoleMode
GetConsoleCP
SetFilePointerEx
HeapReAlloc
HeapSize
GetStringTypeW
SetStdHandle
GetProcessHeap
InitializeCriticalSection
LeaveCriticalSection
CreateNamedPipeW
WriteFile
GetCurrentProcess
EnterCriticalSection
SetLastError
ReadFile
SetNamedPipeHandleState
PeekNamedPipe
LCMapStringW
MultiByteToWideChar
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateSemaphoreA
GetCurrentThread
InitializeCriticalSectionAndSpinCount
WaitForSingleObjectEx
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
RtlUnwindEx
RtlPcToFileHeader
EncodePointer
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
HeapFree
HeapAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
user32
DispatchMessageA
TranslateMessage
GetMessageA
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
OpenProcessToken
GetTokenInformation
OpenThreadToken
ConvertSidToStringSidA
ConvertStringSecurityDescriptorToSecurityDescriptorA
shell32
SHGetFileInfoW
Sections
.text Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE