PnPutil.pdb
Static task
static1
Behavioral task
behavioral1
Sample
31c1d4bc46b74834411fd25e873837bfe66e62c04f74c48c7e78a4b6e771f324_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
31c1d4bc46b74834411fd25e873837bfe66e62c04f74c48c7e78a4b6e771f324_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
31c1d4bc46b74834411fd25e873837bfe66e62c04f74c48c7e78a4b6e771f324_NeikiAnalytics.exe
-
Size
60KB
-
MD5
69e9cc7cfb2248a8b9e16be5e49f4650
-
SHA1
e1315de6a11f561e019ad8ea7cc2ec594dd562a1
-
SHA256
31c1d4bc46b74834411fd25e873837bfe66e62c04f74c48c7e78a4b6e771f324
-
SHA512
afea1a30c1e38afec51677a1287ac8f429f63a0857b55c2c0a715638f2506eca929e17906a8e70e9f1b13684f77775dc6197813825f9324a3c80e0b8a2346759
-
SSDEEP
768:+ObcmUvjeM+ypNluaINmP3eI2wMq6pMsboNNWowgeIsEylZgd5RZ0TFI18OC/cwd:MK0pNl+N62wMqmcNgowgXMZKZApiwY5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 31c1d4bc46b74834411fd25e873837bfe66e62c04f74c48c7e78a4b6e771f324_NeikiAnalytics.exe
Files
-
31c1d4bc46b74834411fd25e873837bfe66e62c04f74c48c7e78a4b6e771f324_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
bdc331d99b00ed4622e1e143f9565de0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFullPathNameW
FindFirstFileW
FindNextFileW
FindClose
GetSystemInfo
lstrlenW
SetLastError
FormatMessageW
LocalFree
WideCharToMultiByte
GetProcessHeap
HeapAlloc
WriteFile
WriteConsoleW
GetLastError
HeapFree
GetCurrentThread
SetThreadPreferredUILanguages
GetStdHandle
GetConsoleMode
GetModuleHandleW
MoveFileW
GetThreadLocale
CompareStringW
GetFileAttributesW
CreateDirectoryW
InterlockedExchange
Sleep
InterlockedCompareExchange
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
CloseHandle
CreateEventW
SetEvent
CreateFileW
WaitForSingleObjectEx
RaiseException
GetSystemWindowsDirectoryW
GetProcAddress
FlushFileBuffers
SetFilePointer
GetVersionExW
GetFileSize
DeleteFileW
LCMapStringW
MapViewOfFile
CreateFileMappingW
UnmapViewOfFile
SetEndOfFile
msvcrt
memset
__wgetmainargs
_cexit
_exit
_resetstkoflw
memcpy
wcsrchr
wcschr
_wcsicmp
_XcptFilter
exit
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_except_handler4_common
_controlfp
_vsnwprintf
user32
LoadStringW
setupapi
SetupEnumPublishedInfW
SetupOpenInfFileW
SetupVerifyInfFileW
SetupCloseInfFile
SetupFindFirstLineW
SetupGetStringFieldW
SetupDiGetClassDescriptionExW
SetupUninstallOEMInfW
SetupCopyOEMInfW
newdev
DiInstallDriverW
ole32
CLSIDFromString
advapi32
IsValidSecurityDescriptor
ConvertStringSecurityDescriptorToSecurityDescriptorW
OpenProcessToken
OpenThreadToken
AdjustTokenPrivileges
SetThreadToken
DuplicateTokenEx
GetKernelObjectSecurity
SetFileSecurityW
ntdll
RtlNtStatusToDosError
Sections
.text Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE