runonce.pdb
Static task
static1
Behavioral task
behavioral1
Sample
65c12b2fe5ecdbef005d3eda2728c11c2a28bfa8103bd26adc209871895b4701_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65c12b2fe5ecdbef005d3eda2728c11c2a28bfa8103bd26adc209871895b4701_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
65c12b2fe5ecdbef005d3eda2728c11c2a28bfa8103bd26adc209871895b4701_NeikiAnalytics.exe
-
Size
76KB
-
MD5
d21b1fc6ec79c24bde75fca5b0022860
-
SHA1
d5c2608073210ae62bdfa5c2903e92ff5e9be8f4
-
SHA256
65c12b2fe5ecdbef005d3eda2728c11c2a28bfa8103bd26adc209871895b4701
-
SHA512
41b04d327dfa3bb545a93902bb07c45d133533768b6bd473878a684208717765e3d3b696a75cad0f18238181cade70543819aadfcfe03cfac37d0712d5665bdd
-
SSDEEP
1536:/uhHbpT5Tg0/DiZ8obysUCB8ZfxH0BARXQIESD0Gu4YAHL1:/uhHbhq0/D+ysUCAxH0aAItIGuZAh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 65c12b2fe5ecdbef005d3eda2728c11c2a28bfa8103bd26adc209871895b4701_NeikiAnalytics.exe
Files
-
65c12b2fe5ecdbef005d3eda2728c11c2a28bfa8103bd26adc209871895b4701_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
d9bd46dd9a8cb1211ff7a758bcc4ce03
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
EventRegister
EventUnregister
RegCloseKey
RegDeleteValueW
RegOpenKeyExW
RegEnumValueW
RegQueryValueExW
RegDeleteKeyW
StartTraceW
EnableTraceEx
StopTraceW
RegQueryInfoKeyW
RegCreateKeyExW
kernel32
LoadLibraryW
GetProcAddress
SetTermsrvAppInstallMode
ExitProcess
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
DeleteFileW
WaitForMultipleObjects
InterlockedExchange
Sleep
GetStartupInfoW
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
CreateThread
GetPrivateProfileIntW
LocalAlloc
CreateJobObjectW
AssignProcessToJobObject
ResumeThread
LocalFree
lstrlenW
CreateProcessW
WaitForSingleObjectEx
CloseHandle
HeapSetInformation
GetVersionExW
GetProcessId
GetWindowsDirectoryW
GetSystemDirectoryW
SetEvent
CreateEventW
CompareStringOrdinal
LoadLibraryA
GetQueuedCompletionStatus
SetInformationJobObject
CreateIoCompletionPort
GetLastError
TerminateThread
InterlockedCompareExchange
gdi32
SelectObject
DeleteObject
BitBlt
GetObjectW
CreateCompatibleDC
SetBkColor
GetTextExtentPointW
CreateFontIndirectW
CreateSolidBrush
GetLayout
ExtTextOutW
user32
GetWindowTextW
GetParent
LoadStringW
GetDlgItem
EndDialog
DestroyMenu
GetMenuDefaultItem
CreatePopupMenu
ExitWindowsEx
PostMessageW
GetSysColor
LoadBitmapW
DrawTextW
SendMessageW
PeekMessageW
PostQuitMessage
DispatchMessageW
SetCursor
LoadCursorW
TranslateMessage
MsgWaitForMultipleObjects
MessageBeep
GetWindowRect
GetDC
ReleaseDC
SetWindowPos
DialogBoxParamW
GetSystemMetrics
MessageBoxW
msvcrt
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_vsnwprintf
_except_handler4_common
_controlfp
iswalpha
memset
wcschr
_purecall
??3@YAXPAX@Z
??2@YAPAXI@Z
shlwapi
ord388
SHGetValueW
SHDeleteValueW
ord460
ord219
ord176
ord217
ord199
PathFindFileNameW
ord174
SHRegGetValueW
PathQuoteSpacesW
ord158
ord437
ole32
CoTaskMemFree
CoInitialize
CoUninitialize
ntdll
EtwEventEnabled
EtwEventWrite
comctl32
ord334
ord328
ord329
shell32
SHBindToParent
SHParseDisplayName
ord155
ord165
SHEvaluateSystemCommandTemplate
ord723
ord100
ord885
Sections
.text Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE