cmdl32.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1b679d497ba9eec3fb60c72a8221fbabc493d109ef7d253ec275a3be01ea89be_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1b679d497ba9eec3fb60c72a8221fbabc493d109ef7d253ec275a3be01ea89be_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1b679d497ba9eec3fb60c72a8221fbabc493d109ef7d253ec275a3be01ea89be_NeikiAnalytics.exe
-
Size
98KB
-
MD5
908c389fb84bacc2ed73a1e04ef8eba0
-
SHA1
ddc98976bc482e9b4007edb98579aaa8c5382130
-
SHA256
1b679d497ba9eec3fb60c72a8221fbabc493d109ef7d253ec275a3be01ea89be
-
SHA512
506a7433342ffbdf542e3c477e684cc9b60254ac61c5be526ec32d93d88bb763eecd012bdeed57f30dbe136b6a3d23d6dcbcf08d06b0253c5521e83d4899085e
-
SSDEEP
1536:KTxwu/tKJ9slZi7t4VQgCkbJWWxbbZiL48PMD9IfWL:i/tKJ9/7uzSWxfZiL4wkIf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b679d497ba9eec3fb60c72a8221fbabc493d109ef7d253ec275a3be01ea89be_NeikiAnalytics.exe
Files
-
1b679d497ba9eec3fb60c72a8221fbabc493d109ef7d253ec275a3be01ea89be_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
d7c75ad5d405344eda1e9287e627f167
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
kernel32
SetLastError
ReadFile
WriteFile
SetFilePointer
CloseHandle
GetTempFileNameA
GetTempPathA
lstrlenA
SetFileAttributesA
lstrcmpiA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
lstrlenW
RemoveDirectoryA
FindClose
FindNextFileA
DeleteFileA
lstrcmpA
FindFirstFileA
WritePrivateProfileStringA
CopyFileA
FlushFileBuffers
Sleep
WaitForSingleObject
ConvertDefaultLocale
GetVersionExA
GetSystemInfo
GetPrivateProfileStringA
GetPrivateProfileIntA
SetCurrentDirectoryA
GetCommandLineA
FreeLibrary
GetProcAddress
LoadLibraryExA
SetEvent
CreateFileA
CreateThread
CreateEventA
GetModuleHandleA
GetCurrentProcessId
GetPrivateProfileSectionA
GlobalFree
ReleaseMutex
CreateMutexA
GetFileSize
CreateDirectoryA
GetProcessHeap
InterlockedIncrement
LoadLibraryA
InterlockedDecrement
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
SetUnhandledExceptionFilter
RtlUnwind
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
GetLastError
GetTickCount
user32
RegisterClassExA
GetClassInfoExA
RegisterWindowMessageA
SetWindowTextA
SendDlgItemMessageA
ShowWindow
KillTimer
EndDialog
SetDlgItemTextA
GetDlgItemTextA
MoveWindow
GetSystemMetrics
SystemParametersInfoA
GetWindowRect
SetWindowLongA
SetFocus
CharNextA
EnableMenuItem
GetWindowLongA
PostMessageA
DialogBoxParamA
msvcrt
memcpy
_controlfp
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
__getmainargs
memset
_vsnprintf
_cexit
cmpbk32
PhoneBookParseInfoA
PhoneBookFreeFilter
PhoneBookLoad
PhoneBookMergeChanges
PhoneBookUnload
cmutil
CmStrchrA
IsLogonAsSystem
CmStrCpyAllocW
CmBuildFullPathFromRelativeA
?DeInit@CmLogFile@@QAEJXZ
?Init@CmLogFile@@QAEJPAUHINSTANCE__@@HPBD@Z
?SetParams@CmLogFile@@QAEJHKPBD@Z
?Start@CmLogFile@@QAEJH@Z
?Stop@CmLogFile@@QAEJXZ
CmLoadIconA
CmLoadSmallIconA
CmStrrchrA
?Log@CmLogFile@@QAAXW4_CMLOG_ITEM@@ZZ
CmFmtMsgA
??1CmLogFile@@QAE@XZ
??0CmLogFile@@QAE@XZ
CmCompareStringA
WzToSzWithAlloc
SzToWzWithAlloc
CmStrCpyAllocA
CmRealloc
CmMalloc
CmFree
comctl32
ord17
rasapi32
RasEnumConnectionsA
winhttp
WinHttpGetDefaultProxyConfiguration
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetProxyForUrl
WinHttpCrackUrl
WinHttpOpen
WinHttpConnect
WinHttpOpenRequest
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpReadData
WinHttpQueryHeaders
WinHttpQueryDataAvailable
WinHttpCloseHandle
Sections
.text Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE