c:\constructicon\builds\gfx\three\23.20\drivers\pxproxy\ogl\build\wNow64a\B_rel\atig6pxx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4bedc64cf76071f646ef9b1fe7b2df991b707f3d83913f735b4086a2e2c24bcf_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4bedc64cf76071f646ef9b1fe7b2df991b707f3d83913f735b4086a2e2c24bcf_NeikiAnalytics.dll
Resource
win10v2004-20240611-en
General
-
Target
4bedc64cf76071f646ef9b1fe7b2df991b707f3d83913f735b4086a2e2c24bcf_NeikiAnalytics.exe
-
Size
187KB
-
MD5
2f30c7fb4bd8b2dcfa142e888899d240
-
SHA1
78360873dc06a61503d438cf9cc70d3963acded3
-
SHA256
4bedc64cf76071f646ef9b1fe7b2df991b707f3d83913f735b4086a2e2c24bcf
-
SHA512
e0dd8812f918d9e9cb656d264f83f4976f767e591561e7177dd681a691eb02a459296a1fbfee3e793cb9a6dc4bb2d887954e47e990d519ecbf4de51a6c0fc693
-
SSDEEP
3072:N493F/Ea29x0xuqKkirDTxTiz58ZjaGgd5koHAxSwM53lznp00:y9287KkirnxTX91K5k6AFC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4bedc64cf76071f646ef9b1fe7b2df991b707f3d83913f735b4086a2e2c24bcf_NeikiAnalytics.exe
Files
-
4bedc64cf76071f646ef9b1fe7b2df991b707f3d83913f735b4086a2e2c24bcf_NeikiAnalytics.exe.dll windows:6 windows x64 arch:x64
80579c12b7d0f6e3d20d5374e3c5bb89
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
LocalFree
ExitProcess
VerSetConditionMask
FreeLibrary
WideCharToMultiByte
VerifyVersionInfoW
FormatMessageA
IsWow64Process
TlsSetValue
EnterCriticalSection
LeaveCriticalSection
LocalSize
InitializeCriticalSection
TlsAlloc
DeleteCriticalSection
TlsFree
CreateFileW
CloseHandle
GetConsoleMode
GetConsoleOutputCP
GetLastError
GetModuleHandleA
LocalAlloc
GetModuleFileNameW
lstrlenA
GetCurrentProcess
GetProcAddress
TlsGetValue
LoadLibraryA
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
RtlUnwindEx
InterlockedFlushSList
RtlPcToFileHeader
RaiseException
SetLastError
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
EncodePointer
TerminateProcess
GetModuleHandleExW
HeapAlloc
MultiByteToWideChar
HeapFree
GetStdHandle
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
LCMapStringW
GetProcessHeap
GetStringTypeW
SetFilePointerEx
SetStdHandle
HeapSize
HeapReAlloc
FlushFileBuffers
WriteFile
WriteConsoleW
user32
ReleaseDC
EnumDisplayDevicesA
MessageBoxA
IsWindow
GetDC
gdi32
SetPixelFormat
DeleteDC
CreateDCA
ChoosePixelFormat
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
Exports
Exports
AmdGetCallbackProcs
DllMain
DrvCopyContext
DrvCreateContext
DrvCreateLayerContext
DrvDeleteContext
DrvDescribeLayerPlane
DrvDescribePixelFormat
DrvGetLayerPaletteEntries
DrvGetProcAddress
DrvPresentBuffers
DrvRealizeLayerPalette
DrvReleaseContext
DrvSetCallbackProcs
DrvSetContext
DrvSetLayerPaletteEntries
DrvSetPixelFormat
DrvShareLists
DrvSwapBuffers
DrvSwapLayerBuffers
DrvValidateVersion
atiPPHSN
atiPS
atiQD
atiQDS
Sections
.text Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ