c:\omtnkdoj\bnwv\yogisfk\cqf.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6b6461d4220c9ff57d359417be7c4129e4f1524bfa8d9914130c5bf213e7f343_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6b6461d4220c9ff57d359417be7c4129e4f1524bfa8d9914130c5bf213e7f343_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
6b6461d4220c9ff57d359417be7c4129e4f1524bfa8d9914130c5bf213e7f343_NeikiAnalytics.exe
-
Size
421KB
-
MD5
0cae4a24c0f7d5636402a5afc9ddef60
-
SHA1
ee3ded34b2f7a289a762e0cd29da059111c61ced
-
SHA256
6b6461d4220c9ff57d359417be7c4129e4f1524bfa8d9914130c5bf213e7f343
-
SHA512
8880b191623ce6223781b936f523dd4bb68b5eb5634a16c709db7bba5db66b6e5e2c7af0fd487450c8873d41a87aca360fe262e6606685555a2abb8ba91d1184
-
SSDEEP
12288:Vtgngwr9wDtwTiLwDUwS9woaH6w40tjl51ATZnj0+vetTkvzMpIT:j+gwr9wDtwTiLwDUwIwoaH6w40tjj1Ad
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6b6461d4220c9ff57d359417be7c4129e4f1524bfa8d9914130c5bf213e7f343_NeikiAnalytics.exe
Files
-
6b6461d4220c9ff57d359417be7c4129e4f1524bfa8d9914130c5bf213e7f343_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
32a31bfad8ca2c4b8a1a523b9cceb9d8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
GetOpenFileNameA
GetSaveFileNameA
gdi32
BitBlt
DeleteDC
CreateCompatibleDC
GetStockObject
SetBkColor
SetTextColor
SelectObject
GetDeviceCaps
CreateCompatibleBitmap
CreateBitmap
TextOutA
DeleteObject
kernel32
RtlUnwind
SetStdHandle
WideCharToMultiByte
GetSystemTimeAsFileTime
WriteFile
GetModuleHandleW
LeaveCriticalSection
DeleteCriticalSection
GetConsoleCP
SetConsoleCtrlHandler
Sleep
GetCurrentThreadId
RaiseException
GetStdHandle
MultiByteToWideChar
TerminateProcess
GetStringTypeW
EnumSystemLocalesW
LoadLibraryExW
ReadFile
OutputDebugStringW
GetCPInfo
HeapFree
GetModuleFileNameW
FormatMessageA
GetCurrentProcess
GetLastError
FreeEnvironmentStringsW
AreFileApisANSI
HeapSize
SetUnhandledExceptionFilter
GetModuleFileNameA
GetConsoleMode
GetEnvironmentStringsW
FlushFileBuffers
IsValidCodePage
CreateSemaphoreW
IsProcessorFeaturePresent
GetACP
EnterCriticalSection
LCMapStringW
FreeLibrary
GetProcAddress
DecodePointer
GetFileType
EncodePointer
CreateFileW
GetProcessHeap
GetOEMCP
TlsFree
CloseHandle
GetStartupInfoW
SetFilePointerEx
HeapAlloc
QueryPerformanceCounter
IsValidLocale
GetModuleHandleExW
TlsGetValue
GetLocaleInfoW
TlsSetValue
IsDebuggerPresent
CompareStringW
InitializeCriticalSectionAndSpinCount
GetDateFormatW
CreateFileA
UnhandledExceptionFilter
LoadLibraryW
SetPriorityClass
InterlockedDecrement
WriteConsoleW
GetTimeFormatW
GetModuleHandleA
HeapReAlloc
SetLastError
GetCurrentProcessId
GetCurrentThread
GetUserDefaultLCID
ExitProcess
FatalAppExitA
InterlockedExchange
InterlockedIncrement
TlsAlloc
GetCurrentDirectoryA
shell32
ShellExecuteA
user32
GetMessageA
InvalidateRect
SetDlgItemTextA
PostQuitMessage
SetCursor
PeekMessageA
DestroyWindow
AdjustWindowRect
MessageBoxA
LoadImageA
GetSystemMenu
IsIconic
DefWindowProcA
LoadStringA
RegisterClassExA
SetForegroundWindow
CloseWindow
GetCursorPos
ReleaseDC
GetSystemMetrics
LoadIconA
CreateWindowExA
ShowCursor
SetWindowPos
GetCursor
SendMessageA
RemoveMenu
GetDlgItemTextA
EndDialog
DialogBoxParamA
GetDC
LoadCursorA
DispatchMessageA
TranslateMessage
WaitMessage
winmm
timeKillEvent
PlaySoundA
timeSetEvent
Sections
.text Size: 55KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 357KB - Virtual size: 361KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ