rasphone.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1dc168204367a3fd36310657162b8493b858bcb24b945e69403ad1461b1e137b_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1dc168204367a3fd36310657162b8493b858bcb24b945e69403ad1461b1e137b_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
1dc168204367a3fd36310657162b8493b858bcb24b945e69403ad1461b1e137b_NeikiAnalytics.exe
-
Size
76KB
-
MD5
181d5c8cb7648e64b439edecded3fe40
-
SHA1
045efe6096e53d343ad031053c7d7cafa5224d27
-
SHA256
1dc168204367a3fd36310657162b8493b858bcb24b945e69403ad1461b1e137b
-
SHA512
51d0f61830e73e245cfd42594e271c4cdcd09e6b4cc95e84668899a2161ccae6711020aa8500457300f69ff82344375d4034ef85d3998560860e31d0f758cf7c
-
SSDEEP
1536:V+1HpAf3arEB2En1T25B/HZaR3OvejXaKjzlgVOto8GCVN:5XBN2n/IxOWzaIZgsRG+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1dc168204367a3fd36310657162b8493b858bcb24b945e69403ad1461b1e137b_NeikiAnalytics.exe
Files
-
1dc168204367a3fd36310657162b8493b858bcb24b945e69403ad1461b1e137b_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
b5d03b699d548c3ead0d6d4f52b7bf83
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegDeleteValueW
RegDeleteKeyExW
RegOpenKeyExW
RegEnumKeyExW
RegCreateKeyExW
RegSetValueExW
kernel32
OpenProcess
FormatMessageW
ReadFile
GlobalAddAtomW
CreateActCtxW
ReleaseActCtx
ActivateActCtx
GetFileSizeEx
GetModuleFileNameW
ReadProcessMemory
SetFilePointerEx
GetPrivateProfileStringW
HeapSetInformation
lstrlenA
GetModuleHandleW
GetProcAddress
DeactivateActCtx
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
WideCharToMultiByte
GetLastError
K32GetModuleBaseNameA
LoadLibraryW
LocalFree
GetSystemDirectoryW
FreeLibrary
GlobalFree
GlobalAlloc
CloseHandle
CreateFileW
GlobalReAlloc
MultiByteToWideChar
lstrlenW
CompareStringW
msvcrt
memset
__argv
__argc
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_except_handler4_common
_controlfp
rtutils
TraceDeregisterExA
TracePrintfExA
TraceRegisterExA
ntdll
ord2
_vsnwprintf
atol
RtlFreeHeap
RtlAllocateHeap
NtQueryInformationProcess
memcpy
ord1
user32
GetSystemMetrics
GetPropW
ShowWindow
IsWindowVisible
SetPropW
RemovePropW
LoadStringW
CharNextW
CharPrevW
GetParent
UnhookWindowsHookEx
MessageBoxW
SetWindowsHookExW
SetWindowPos
GetWindowRect
rpcrt4
I_RpcExceptionFilter
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE