exe\sqlmangr.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5b16fab44bc83864306de7a6b47e4c0791a9f81f9ae6fefb4474d62d05dfdb13_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5b16fab44bc83864306de7a6b47e4c0791a9f81f9ae6fefb4474d62d05dfdb13_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
5b16fab44bc83864306de7a6b47e4c0791a9f81f9ae6fefb4474d62d05dfdb13_NeikiAnalytics.exe
-
Size
108KB
-
MD5
7cd09866cf65e5429c79e3c8a14677b0
-
SHA1
58fbe221d8e1a00f50d9559e4950dfc1dab61a96
-
SHA256
5b16fab44bc83864306de7a6b47e4c0791a9f81f9ae6fefb4474d62d05dfdb13
-
SHA512
6475c99fb61563c5cdb00950fc75a9e2bf830131393ac96405bc80f065ab4bbdfa737c501bdccfc6f3d51bde7e012d7994f2d6255ca109c7dcf4da04e081e240
-
SSDEEP
1536:79+V6ZZbB5yWCVH1EDS8uaikZfw++m81oniH3izTFTqHnJ14hn6tvApQ/D5sjpYH:7Vb+LaimtXoGhOvD/D5sjpYGZfkbB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5b16fab44bc83864306de7a6b47e4c0791a9f81f9ae6fefb4474d62d05dfdb13_NeikiAnalytics.exe
Files
-
5b16fab44bc83864306de7a6b47e4c0791a9f81f9ae6fefb4474d62d05dfdb13_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
4d9ecbb286fcbc297a119cd79839d0d9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
sqlunirl
_SendMessage@16
_LoadString@16
_SetWindowText@8
_GetWindowText@12
_PostMessage@16
_SetDlgItemText@12
_GetVersionEx@4
_MAKEINTRESOURCE@4
_LoadBitmap@8
_GetObject@12
_CreateDialogIndirectParam@20
_FindResource@12
_IsDialogMessage@8
_LoadCursor@8
_LoadIcon@8
_GetUnicodeRedirectionLayer@0
_DefWindowProc@16
_SendDlgItemMessage@20
_MessageBox@16
_FormatMessage@28
_SetWindowLong@12
_GetComputerName@8
_GetTextExtentPoint32@16
_GetWindowTextLength@4
_GetTextExtentPoint@16
_CallWindowProc@20
_OpenFile_@12
_LoadLibrary@4
_GetModuleFileName@12
gdi32
GetBkColor
kernel32
GetStartupInfoA
ExitProcess
QueryPerformanceCounter
GetModuleHandleA
GetCurrentThreadId
GetCurrentProcessId
FindClose
GlobalFlags
GlobalReAlloc
IsDBCSLeadByte
_lclose
GetCurrentProcess
GetCurrentThread
DuplicateHandle
LocalFree
GetLocalTime
ResetEvent
GetTickCount
GetSystemTimeAsFileTime
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
GetOEMCP
GlobalFree
GlobalUnlock
GlobalLock
FreeResource
SizeofResource
LockResource
LoadResource
GlobalAlloc
GetLastError
FreeLibrary
LoadLibraryA
GetSystemDirectoryA
GetUserDefaultLCID
ReleaseSemaphore
TerminateThread
WaitForSingleObject
CloseHandle
SetEvent
Sleep
user32
GetSystemMetrics
BeginPaint
EndPaint
GetWindowRect
MoveWindow
SetCursor
UpdateWindow
GetParent
IsIconic
SetForegroundWindow
GetCursorPos
CreatePopupMenu
CheckMenuItem
EnableMenuItem
TrackPopupMenu
DestroyMenu
MessageBoxW
EndDialog
ShowWindow
EnableWindow
GetDlgItem
DestroyWindow
GetDC
IsDlgButtonChecked
GetDlgItemInt
CheckDlgButton
ReleaseDC
PostQuitMessage
GetDesktopWindow
GetSystemMenu
DeleteMenu
SetFocus
TranslateMessage
SetDlgItemInt
advapi32
CloseServiceHandle
RegCloseKey
msvcr71
_onexit
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
toupper
_endthread
_beginthread
realloc
wcsncpy
malloc
_endthreadex
wcsstr
_wcsnicmp
wcsrchr
free
_beginthreadex
_snprintf
wcslen
memmove
wcschr
_wtoi
memcpy
wcscpy
_wcsicmp
wcscat
memset
_except_handler3
__security_error_handler
__dllonexit
__set_app_type
_controlfp
comctl32
ImageList_SetBkColor
ImageList_Draw
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
ImageList_GetImageCount
shell32
SHFileOperationA
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ole32
CoInitialize
CoUninitialize
CoCreateInstance
CoInitializeEx
w95scm
SQLSCMEnumClusterSQLServicesW
SQLSCMControlPlatW
SQLSCMEnumDependentServicesW
SQLSCMGetServiceStatePlatW
odbc32
ord136
ord24
ord75
ord31
ord139
ord155
ord9
sqlsvc
QSQLEnumerateServers
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tlylizq Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE