runonce.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1b489357b3a62a1067c3b7ee9ff26dd51d491f3c8a5b1117e51455bdf5cdf61e_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1b489357b3a62a1067c3b7ee9ff26dd51d491f3c8a5b1117e51455bdf5cdf61e_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1b489357b3a62a1067c3b7ee9ff26dd51d491f3c8a5b1117e51455bdf5cdf61e_NeikiAnalytics.exe
-
Size
76KB
-
MD5
2ecf32336094c1ccf78ed372e8d5a500
-
SHA1
e2c6ac099f1e41eaeac700a0bd24affb122362a5
-
SHA256
1b489357b3a62a1067c3b7ee9ff26dd51d491f3c8a5b1117e51455bdf5cdf61e
-
SHA512
87beb7522fc028fd8f872611ce2f406b33f6c010bd27094567c398f4ce7d3ba7d9841f3a3e950ca4eba880cd431ea9a2164fd2ad6de0a492aa283e4c1dac04d2
-
SSDEEP
1536:LuhHbpT5Tg0/DiZ8obysUCB8ZfHdOfdwC:LuhHbhq0/D+ysUCAM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b489357b3a62a1067c3b7ee9ff26dd51d491f3c8a5b1117e51455bdf5cdf61e_NeikiAnalytics.exe
Files
-
1b489357b3a62a1067c3b7ee9ff26dd51d491f3c8a5b1117e51455bdf5cdf61e_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
d9bd46dd9a8cb1211ff7a758bcc4ce03
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
EventRegister
EventUnregister
RegCloseKey
RegDeleteValueW
RegOpenKeyExW
RegEnumValueW
RegQueryValueExW
RegDeleteKeyW
StartTraceW
EnableTraceEx
StopTraceW
RegQueryInfoKeyW
RegCreateKeyExW
kernel32
LoadLibraryW
GetProcAddress
SetTermsrvAppInstallMode
ExitProcess
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
DeleteFileW
WaitForMultipleObjects
InterlockedExchange
Sleep
GetStartupInfoW
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
CreateThread
GetPrivateProfileIntW
LocalAlloc
CreateJobObjectW
AssignProcessToJobObject
ResumeThread
LocalFree
lstrlenW
CreateProcessW
WaitForSingleObjectEx
CloseHandle
HeapSetInformation
GetVersionExW
GetProcessId
GetWindowsDirectoryW
GetSystemDirectoryW
SetEvent
CreateEventW
CompareStringOrdinal
LoadLibraryA
GetQueuedCompletionStatus
SetInformationJobObject
CreateIoCompletionPort
GetLastError
TerminateThread
InterlockedCompareExchange
gdi32
SelectObject
DeleteObject
BitBlt
GetObjectW
CreateCompatibleDC
SetBkColor
GetTextExtentPointW
CreateFontIndirectW
CreateSolidBrush
GetLayout
ExtTextOutW
user32
GetWindowTextW
GetParent
LoadStringW
GetDlgItem
EndDialog
DestroyMenu
GetMenuDefaultItem
CreatePopupMenu
ExitWindowsEx
PostMessageW
GetSysColor
LoadBitmapW
DrawTextW
SendMessageW
PeekMessageW
PostQuitMessage
DispatchMessageW
SetCursor
LoadCursorW
TranslateMessage
MsgWaitForMultipleObjects
MessageBeep
GetWindowRect
GetDC
ReleaseDC
SetWindowPos
DialogBoxParamW
GetSystemMetrics
MessageBoxW
msvcrt
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_vsnwprintf
_except_handler4_common
_controlfp
iswalpha
memset
wcschr
_purecall
??3@YAXPAX@Z
??2@YAPAXI@Z
shlwapi
ord388
SHGetValueW
SHDeleteValueW
ord460
ord219
ord176
ord217
ord199
PathFindFileNameW
ord174
SHRegGetValueW
PathQuoteSpacesW
ord158
ord437
ole32
CoTaskMemFree
CoInitialize
CoUninitialize
ntdll
EtwEventEnabled
EtwEventWrite
comctl32
ord334
ord328
ord329
shell32
SHBindToParent
SHParseDisplayName
ord155
ord165
SHEvaluateSystemCommandTemplate
ord723
ord100
ord885
Sections
.text Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE