C:\DOCUME~1\sebldsa\LOCALS~1\Temp\1\dpolarisqfe\optPolarisQFE\baseline\WMPLAYER.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0b92c025e546ed5d69fe9716bf8ac5fb59f0d95a60ca4eb89262d00af0fe6e1f_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0b92c025e546ed5d69fe9716bf8ac5fb59f0d95a60ca4eb89262d00af0fe6e1f_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
0b92c025e546ed5d69fe9716bf8ac5fb59f0d95a60ca4eb89262d00af0fe6e1f_NeikiAnalytics.exe
-
Size
89KB
-
MD5
13b8566e09cb5c5457a1d8114aed0f00
-
SHA1
535bc1c676be6a7dfec0b24d5c0af67e7c98a1f7
-
SHA256
0b92c025e546ed5d69fe9716bf8ac5fb59f0d95a60ca4eb89262d00af0fe6e1f
-
SHA512
ce71b5e25c27389132cbd9c6efa773af33e080a47717ca853ee968f7655e1e734b00e2ce43b70be5b4e2c95b4b5443ce405fc6d4cdf9abaf3a55776c560c79d0
-
SSDEEP
1536:X4LDcIXdHD533a5MQxO7LeRiAfLiJaKQzQW0xYOBJyypgmDzV5j:X6lXdN336MdMfLirkQW0/nyypt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b92c025e546ed5d69fe9716bf8ac5fb59f0d95a60ca4eb89262d00af0fe6e1f_NeikiAnalytics.exe
Files
-
0b92c025e546ed5d69fe9716bf8ac5fb59f0d95a60ca4eb89262d00af0fe6e1f_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
bcab579dc6062171842d415a5071d9bc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
kernel32
GetLastError
lstrlenW
CompareStringA
ExitProcess
FreeLibrary
SetErrorMode
GetProcAddress
HeapFree
SetCurrentDirectoryW
ExpandEnvironmentStringsW
HeapAlloc
CreateMutexW
GetStartupInfoW
GetProcessHeap
SetThreadPriority
GetCurrentThread
LocalFree
LoadLibraryW
FormatMessageW
GetCommandLineW
GetModuleHandleW
CloseHandle
SetEvent
OpenEventW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
LoadLibraryA
InterlockedExchange
LocalAlloc
RaiseException
user32
SetForegroundWindow
GetClassNameA
GetParent
GetDesktopWindow
GetWindowThreadProcessId
IsWindowVisible
GetWindow
MessageBoxW
GetSystemMetrics
ShowWindow
FindWindowW
SendMessageTimeoutW
IsIconic
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 53KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 27KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE