TabTip.pdb
Static task
static1
Behavioral task
behavioral1
Sample
56cd5bf751e30417346aaa612c7f708a03fb48607d995c645404e10c8fe41928_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
56cd5bf751e30417346aaa612c7f708a03fb48607d995c645404e10c8fe41928_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
56cd5bf751e30417346aaa612c7f708a03fb48607d995c645404e10c8fe41928_NeikiAnalytics.exe
-
Size
177KB
-
MD5
86dbea66df82232f4482d446188d8ed0
-
SHA1
d0263a54cdac5f6e20754670ed3a6192c7741ab4
-
SHA256
56cd5bf751e30417346aaa612c7f708a03fb48607d995c645404e10c8fe41928
-
SHA512
f425670f1eeccab6689d8e01c8ec3ffe28a127544f9cb743147ae424cd791e724773c098d123f1558e875cb3a14704876eec1bedced9075257d93e17cd8e7079
-
SSDEEP
3072:y/dOzcUNpNFAbqfbwMAH9NI9fa7LFHntVPN9WXcj3J/ZmvJ14/PjUhf:WOYUNXSuwPH9pLFNVPVlZmvJ12P8f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 56cd5bf751e30417346aaa612c7f708a03fb48607d995c645404e10c8fe41928_NeikiAnalytics.exe
Files
-
56cd5bf751e30417346aaa612c7f708a03fb48607d995c645404e10c8fe41928_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
202e24e14b6d362112ccbf1cfcd44d0f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
UnregisterClassA
GetThreadDesktop
GetAncestor
GetWindow
GetDlgCtrlID
GetKeyboardLayout
MapVirtualKeyExW
MapVirtualKeyW
SendInput
GetClassNameW
GetForegroundWindow
GetWindowThreadProcessId
SetProcessDPIAware
GetMessageW
TranslateMessage
DispatchMessageW
SetThreadDesktop
SetWinEventHook
GetSystemMetrics
UnhookWinEvent
FindWindowW
PostMessageW
KillTimer
SetTimer
PostThreadMessageW
OpenInputDesktop
CloseDesktop
GetUserObjectInformationW
CharUpperW
CharNextW
msvcrt
memmove_s
_purecall
free
memcpy_s
_wcsicmp
calloc
__CxxFrameHandler3
wcstol
wcsstr
_CxxThrowException
malloc
_wcsnicmp
memset
qsort
wcschr
_itow
_controlfp
_errno
realloc
_onexit
_lock
__dllonexit
_unlock
_except_handler4_common
??1type_info@@UAE@XZ
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
memcpy
_beginthreadex
_callnewh
wcsncmp
vswprintf_s
_vscwprintf
_wtoi
_vsnwprintf
_ftol2
wcsrchr
towupper
iswspace
ntdll
EtwEventWrite
WinSqmAddToStream
EtwEventRegister
EtwEventUnregister
NtQuerySystemInformation
RtlReportException
api-ms-win-core-processthreads-l1-1-0
OpenProcessToken
GetCurrentProcess
OpenThreadToken
GetCurrentThread
GetCurrentThreadId
SetProcessShutdownParameters
CreateThread
GetStartupInfoW
TerminateProcess
GetCurrentProcessId
api-ms-win-security-base-l1-1-0
InitializeAcl
GetSecurityDescriptorControl
MakeAbsoluteSD
GetSecurityDescriptorSacl
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
GetSecurityDescriptorOwner
InitializeSecurityDescriptor
GetLengthSid
IsValidSid
CopySid
GetAclInformation
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
GetSidSubAuthority
InitializeSid
GetSidLengthRequired
GetTokenInformation
EqualSid
AddAce
kernel32
K32GetModuleBaseNameW
WaitForMultipleObjects
K32GetModuleFileNameExW
K32EnumProcessModules
OpenProcess
GetFileTime
OpenEventW
CompareFileTime
CreateFileW
QueueUserWorkItem
GetTickCount
CreateTimerQueueTimer
Sleep
LoadLibraryExW
HeapSetInformation
GetCommandLineW
CreateEventW
UnregisterWait
WaitForSingleObject
GetModuleHandleExW
RegisterWaitForSingleObject
GetModuleFileNameW
CloseHandle
InterlockedDecrement
InterlockedIncrement
GetModuleHandleW
lstrlenW
FreeLibrary
LeaveCriticalSection
EnterCriticalSection
SetEvent
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
CreateMutexW
OpenMutexW
DeleteTimerQueueTimer
LoadLibraryW
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
GetProcAddress
HeapSize
GetProcessHeap
GetVersionExA
InterlockedExchange
InterlockedCompareExchange
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetSystemTimeAsFileTime
UnhandledExceptionFilter
OutputDebugStringA
CompareStringW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
ole32
CoInitializeSecurity
CoCancelCall
CoTaskMemFree
CoEnableCallCancellation
CoResumeClassObjects
CoInitialize
CoDisconnectObject
CoUninitialize
CoInitializeEx
CoCreateInstance
CoRegisterClassObject
CoRevokeClassObject
CoDisableCallCancellation
oleaut32
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCopy
SafeArrayLock
SafeArrayGetVartype
SafeArrayUnlock
VarBstrCat
SysAllocStringLen
SysAllocString
LoadTypeLi
SafeArrayRedim
SafeArrayCreate
SysStringLen
SafeArrayDestroy
SysAllocStringByteLen
SysStringByteLen
VarBstrCmp
VariantInit
VariantClear
SafeArrayUnaccessData
LoadRegTypeLi
SysFreeString
oleacc
AccessibleObjectFromWindow
shlwapi
PathFileExistsW
SHCreateStreamOnFileEx
imm32
ImmDisableTextFrameService
slc
SLGetWindowsInformationDWORD
comctl32
ord344
api-ms-win-core-localregistry-l1-1-0
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
api-ms-win-service-management-l1-1-0
CloseServiceHandle
OpenSCManagerW
OpenServiceW
StartServiceW
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE