D:\builds\build-sourcemod-msvc12\windows-1.11\OUTPUT\core\sourcemod.2.bms\windows-x86\sourcemod.2.bms.pdb
Static task
static1
Behavioral task
behavioral1
Sample
28b6637b8128974b613677f7cc614761202903ed2d04eea875b070f903688d94_NeikiAnalytics.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
28b6637b8128974b613677f7cc614761202903ed2d04eea875b070f903688d94_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
28b6637b8128974b613677f7cc614761202903ed2d04eea875b070f903688d94_NeikiAnalytics.exe
-
Size
495KB
-
MD5
105e41264e5579fa54a5dc5eff12ee80
-
SHA1
2be1bacc23f80f672fc9b3137eeeef135e339f40
-
SHA256
28b6637b8128974b613677f7cc614761202903ed2d04eea875b070f903688d94
-
SHA512
a69cdf915e0d73445b121432264c030200cd1fb543f8fec1cd6afab1b599642488620cd60e87b3ce2aeafc6be649cd99fa68115d16c1e3fa03cc071c8b964493
-
SSDEEP
6144:OMno9UNxzV4D7SxT4p5l7kI/n9T5+GPm7bm/AOfTdS2OlA:Oio9UNdV4D7e4p5pkI/97kb8nSHA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 28b6637b8128974b613677f7cc614761202903ed2d04eea875b070f903688d94_NeikiAnalytics.exe
Files
-
28b6637b8128974b613677f7cc614761202903ed2d04eea875b070f903688d94_NeikiAnalytics.exe.dll windows:5 windows x86 arch:x86
d31427310e70561a5404467d43de6bec
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetFileAttributesA
GetLastError
FreeLibrary
GetProcAddress
FormatMessageA
LoadLibraryA
ReadConsoleW
ReadFile
SetEndOfFile
SetFilePointerEx
HeapReAlloc
HeapSize
CreateFileW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
CreateDirectoryW
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetCurrentThreadId
MultiByteToWideChar
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
CloseHandle
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
RaiseException
RtlUnwind
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
InterlockedFlushSList
SetLastError
GetStdHandle
GetFileType
GetModuleFileNameA
GetModuleHandleExW
WriteConsoleW
ExitProcess
HeapFree
HeapAlloc
GetACP
LCMapStringW
GetStringTypeW
DecodePointer
WriteFile
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
tier0
MemAllocScratch
g_VProfCurrentProfile
?OutputReport@CVProfile@@QAEXHPBDH@Z
?Pause@CVProfile@@QAEXXZ
?ExitScope@CVProfile@@QAEXXZ
?EnterScope@CVProfile@@QAEXPBDH0_NH@Z
?Resume@CVProfNode@@QAEXXZ
g_pMemAlloc
Warning
GetSpewOutputFunc
SpewOutputFunc
MemFreeScratch
DevMsg
?DevMsg@@YAXPBDZZ
vstdlib
RandomFloat
RandomInt
KeyValuesSystem
RandomSeed
Exports
Exports
CreateInterface
cvar
Sections
.text Size: 357KB - Virtual size: 357KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 284B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 880B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ