PerfHost.pdb
Static task
static1
Behavioral task
behavioral1
Sample
080fe6a0955a04ab0c5aae2fb6f64d6157e7a6cb2040e5dffd00951b79e85402_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
080fe6a0955a04ab0c5aae2fb6f64d6157e7a6cb2040e5dffd00951b79e85402_NeikiAnalytics.exe
-
Size
161KB
-
MD5
8330b96574a8f0b0d7845961b19a8420
-
SHA1
45196399da3baff82396546b791c9c39f77c0811
-
SHA256
080fe6a0955a04ab0c5aae2fb6f64d6157e7a6cb2040e5dffd00951b79e85402
-
SHA512
116180a1aa812121b5697efb5ae07b46464d1a30bdcabb7988ea7e7c4b05aaa67566f0e1104ff2ddecce7e73171b28ec887484b0239f6a6bf4ed0b3c2ee3acc5
-
SSDEEP
3072:/5PkLRbS89Hbp0qLYCmoZjihpubJIuXBJubec/T16iLP:/dO9pZjihpuLub7Iib
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 080fe6a0955a04ab0c5aae2fb6f64d6157e7a6cb2040e5dffd00951b79e85402_NeikiAnalytics.exe
Files
-
080fe6a0955a04ab0c5aae2fb6f64d6157e7a6cb2040e5dffd00951b79e85402_NeikiAnalytics.exe.exe windows:10 windows x86 arch:x86
3b1494b15b4dae22812c269c29d3e478
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_wcsicmp
_exit
_amsg_exit
__p__commode
_vsnwprintf
exit
__wgetmainargs
_XcptFilter
memcpy
_cexit
__p__fmode
__setusermatherr
_initterm
?terminate@@YAXXZ
_except_handler4_common
__set_app_type
_controlfp
memset
ntdll
NtClose
NtQueryInformationToken
RtlNtStatusToDosError
NtOpenThreadToken
EtwEventWrite
RtlAllocateHeap
RtlExpandEnvironmentStrings
EtwEventUnregister
EtwEventRegister
RtlReleaseSRWLockShared
RtlAcquireSRWLockShared
RtlReleaseSRWLockExclusive
RtlAcquireSRWLockExclusive
RtlFreeHeap
rpcrt4
RpcServerUseProtseqW
RpcRevertToSelf
RpcEpRegisterW
RpcServerInqBindings
RpcServerRegisterIfEx
RpcServerUnregisterIf
RpcBindingVectorFree
RpcEpUnregister
RpcStringFreeW
RpcStringBindingParseW
RpcBindingToStringBindingW
RpcBindingInqAuthClientW
RpcImpersonateClient
NdrServerCall2
api-ms-win-core-errorhandling-l1-1-0
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetLastError
api-ms-win-core-heap-l1-1-0
HeapSetInformation
api-ms-win-core-libraryloader-l1-2-0
GetModuleHandleW
GetProcAddress
LoadLibraryExW
FreeLibrary
api-ms-win-core-registry-l1-1-0
RegOpenKeyExW
RegQueryValueExW
RegQueryValueExA
RegCloseKey
api-ms-win-core-processthreads-l1-1-0
GetCurrentThreadId
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-synch-l1-1-0
InitializeSRWLock
api-ms-win-core-synch-l1-2-0
Sleep
api-ms-win-core-sysinfo-l1-1-0
GetTickCount
GetSystemTimeAsFileTime
api-ms-win-core-threadpool-l1-2-0
CloseThreadpoolWork
SubmitThreadpoolWork
CreateThreadpoolWork
api-ms-win-service-core-l1-1-0
SetServiceStatus
RegisterServiceCtrlHandlerExW
StartServiceCtrlDispatcherW
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 956B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 141KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ