diskpart.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1b088e922f964fd55c2b6ab9cf2ac16c7ef915d9938cb93cbd3a71796b07a64f_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1b088e922f964fd55c2b6ab9cf2ac16c7ef915d9938cb93cbd3a71796b07a64f_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
1b088e922f964fd55c2b6ab9cf2ac16c7ef915d9938cb93cbd3a71796b07a64f_NeikiAnalytics.exe
-
Size
157KB
-
MD5
f240e4ed5aaab41248a9cd991dc02d40
-
SHA1
7b419ab57fd1a05524b5b516a75c34080fb3f6dc
-
SHA256
1b088e922f964fd55c2b6ab9cf2ac16c7ef915d9938cb93cbd3a71796b07a64f
-
SHA512
63abb4063e0aa6e3207bd977a3fe071d7f31fb70e4967c07f26c8801e0df0fe304ebc8164fabb2820922aa84fd7992b3a799b568a3e58fcd49d45e72c0b242d4
-
SSDEEP
3072:oVjtDoix5QX/48wrI6HQP4ckAGJKMncFr8K:oVjto28wrM4VAGtwh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b088e922f964fd55c2b6ab9cf2ac16c7ef915d9938cb93cbd3a71796b07a64f_NeikiAnalytics.exe
Files
-
1b088e922f964fd55c2b6ab9cf2ac16c7ef915d9938cb93cbd3a71796b07a64f_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
d7ee6b696c7eb2e155ce4496b79ecc6f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegOpenKeyW
RegCloseKey
kernel32
GetLastError
DeviceIoControl
CloseHandle
CreateFileW
GetVersionExW
ExitProcess
SetConsoleCtrlHandler
RegisterApplicationRestart
GetComputerNameW
GetConsoleMode
GetFileType
GetStdHandle
SetThreadUILanguage
HeapSetInformation
ExpandEnvironmentStringsW
Sleep
GetModuleHandleW
LocalFree
WriteFile
LocalAlloc
WideCharToMultiByte
WriteConsoleW
FormatMessageW
FreeLibrary
LoadLibraryW
GetWindowsDirectoryW
InterlockedIncrement
InterlockedDecrement
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
OutputDebugStringA
InterlockedCompareExchange
InterlockedExchange
UnhandledExceptionFilter
msvcrt
wcschr
_iob
_wfopen
fclose
setvbuf
setlocale
wcspbrk
fgetwc
malloc
towupper
iswalpha
swscanf
_wcstoui64
wcstol
_ltow
_ui64tow
_wtoi
_wtoi64
_wcsupr
wcsrchr
_callnewh
__wgetmainargs
_cexit
??0exception@@QAE@XZ
_XcptFilter
exit
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
??1type_info@@UAE@XZ
_unlock
__dllonexit
_lock
_onexit
?terminate@@YAXXZ
_except_handler4_common
_controlfp
__CxxFrameHandler3
_errno
wcstoul
wcsstr
_CxxThrowException
_wtol
memset
wcsspn
_wcsicmp
_ultow
memcpy_s
memmove_s
??0exception@@QAE@ABQBD@Z
_exit
free
_vsnwprintf
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
?what@exception@@UBEPBDXZ
_wcsnicmp
rpcrt4
UuidCreate
UuidToStringW
RpcStringFreeW
UuidFromStringW
ole32
CoInitializeEx
CoInitializeSecurity
CoCreateInstance
CoUninitialize
StringFromGUID2
CoCreateGuid
CoTaskMemFree
user32
LoadStringW
Sections
.text Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE