drwtsn32.pdb
Static task
static1
Behavioral task
behavioral1
Sample
64b22b5f3dd6761a31bc7edf33e12a0eb092695b343b15acd4ca6ce87d2ed621_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
64b22b5f3dd6761a31bc7edf33e12a0eb092695b343b15acd4ca6ce87d2ed621_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
64b22b5f3dd6761a31bc7edf33e12a0eb092695b343b15acd4ca6ce87d2ed621_NeikiAnalytics.exe
-
Size
71KB
-
MD5
f6d2a320fac3154ed11c558f5fb7ed70
-
SHA1
dad773949a1ff9b6b90603af898d374dd658d52b
-
SHA256
64b22b5f3dd6761a31bc7edf33e12a0eb092695b343b15acd4ca6ce87d2ed621
-
SHA512
cbbe2419e9d982ef83dc4dbd1cfdf83eafb3addc0e81a581e6e0e16989cf34292b483c6faac6be5f878d1bfc30a26446df808ceca0b8934e2dae3872a470fb58
-
SSDEEP
1536:kuv9rWZXUCj3m8BTwQtSHPvGDvaT8deivDTy+1L:kugX9PwQtSHPvGGTlm/N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 64b22b5f3dd6761a31bc7edf33e12a0eb092695b343b15acd4ca6ce87d2ed621_NeikiAnalytics.exe
Files
-
64b22b5f3dd6761a31bc7edf33e12a0eb092695b343b15acd4ca6ce87d2ed621_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
44da0db04844b8ad84714d28b1110c57
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
calloc
strchr
swprintf
free
malloc
wprintf
isprint
sprintf
_snwprintf
_vsnwprintf
wcsncpy
swscanf
_wtoi
wcscmp
_wgetcwd
_wcsicmp
tolower
realloc
_wtol
_wsplitpath
_wmakepath
_c_exit
_exit
_XcptFilter
_cexit
exit
__initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
wcscat
isdigit
wcscpy
wcslen
advapi32
RegOpenKeyExA
RegQueryValueExA
IsTextUnicode
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegisterEventSourceW
ReportEventW
DeregisterEventSource
ReadEventLogW
OpenEventLogW
ClearEventLogW
CloseEventLog
GetUserNameW
kernel32
SetFilePointer
ReadFile
ReleaseSemaphore
WriteFile
GetModuleFileNameW
CreateDirectoryW
GetLastError
LocalFree
SetErrorMode
SetEvent
GetLocalTime
GetDateFormatW
OpenProcess
CreateFileW
WideCharToMultiByte
MultiByteToWideChar
CreateThread
DeleteFileW
GetFileAttributesW
LoadResource
FindResourceExW
ExpandEnvironmentStringsW
GetProcAddress
FreeLibrary
InterlockedCompareExchange
LoadLibraryA
GetModuleHandleA
CreateSemaphoreW
OpenSemaphoreW
TerminateThread
TerminateProcess
GetCommandLineW
DelayLoadFailureHook
GetModuleHandleW
FormatMessageW
ExitProcess
GetComputerNameW
GetVersion
GetSystemInfo
ProcessIdToSessionId
CloseHandle
WaitForSingleObject
Sleep
gdi32
SelectObject
GetTextMetricsW
GetTextExtentPointW
GetStockObject
user32
CallWindowProcW
GetCursorPos
ScreenToClient
ChildWindowFromPoint
GetDlgCtrlID
WinHelpW
IsDlgButtonChecked
SendDlgItemMessageW
SetDlgItemTextA
GetDlgItemTextW
GetSystemMenu
AppendMenuW
GetDC
ReleaseDC
LoadIconW
LoadCursorW
RegisterClassW
CreateDialogParamW
MessageBeep
GetMessageW
IsDialogMessageW
TranslateMessage
DispatchMessageW
DialogBoxParamW
GetDlgItem
ShowWindow
EnableWindow
DefDlgProcW
KillTimer
PostQuitMessage
DefWindowProcW
SetTimer
EndDialog
SetDlgItemTextW
MessageBoxW
EnumChildWindows
SetWindowLongW
GetWindowLongW
UpdateWindow
SendMessageW
PostMessageW
SetForegroundWindow
GetParent
SetFocus
dbgeng
DebugCreate
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE