t:\clview\x86\ship\0\clview.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5d74fda40632ec0e256810aac01b2df5fd66cce5ca5ca12d8369e7f142696367_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5d74fda40632ec0e256810aac01b2df5fd66cce5ca5ca12d8369e7f142696367_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
5d74fda40632ec0e256810aac01b2df5fd66cce5ca5ca12d8369e7f142696367_NeikiAnalytics.exe
-
Size
759KB
-
MD5
e40461098c0f6a662ea02ae7de66cd30
-
SHA1
7517c454c7428aca106186265d73fc3d48d74e67
-
SHA256
5d74fda40632ec0e256810aac01b2df5fd66cce5ca5ca12d8369e7f142696367
-
SHA512
1ecc1d6b62b993399b2577614612d8bdc56369d30a45f08b11a6b9066e30d398d3fdba0ac90f9f46d774d4e6d932c611f84fa729131809287a011b2fb0d30a1b
-
SSDEEP
12288:O0H4KiIQ2slPYGt/sB1KcYmqgZvAMlUoUjG+YKtMfnkOeZb5JYiNAgAPho:lYKiIClPft/sBlDqgZQd6XKtiMJYiPUo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5d74fda40632ec0e256810aac01b2df5fd66cce5ca5ca12d8369e7f142696367_NeikiAnalytics.exe
Files
-
5d74fda40632ec0e256810aac01b2df5fd66cce5ca5ca12d8369e7f142696367_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
b525b133652cd0240e3f916da9fb0c1f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
CreateSolidBrush
DeleteObject
kernel32
RaiseException
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
GetCurrentProcess
GetCurrentThreadId
SetLastError
MulDiv
GetCommandLineW
FreeLibrary
InitializeCriticalSection
DeleteCriticalSection
lstrlenW
GetLastError
lstrcmpiW
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleHandleW
GetModuleFileNameW
DeleteFileW
MoveFileExW
CloseHandle
WriteFile
ReadFile
GetFileSize
GlobalUnlock
GlobalLock
GlobalAlloc
GetUserDefaultLCID
lstrlenA
GetTempFileNameW
GetTempPathW
CreateThread
FindClose
FindFirstFileW
GetLongPathNameW
WaitForSingleObject
ReleaseMutex
CreateMutexW
WideCharToMultiByte
CreateProcessW
ProcessIdToSessionId
GetCurrentProcessId
LocalAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
LoadLibraryW
GetTempPathA
GetTempFileNameA
CreateProcessA
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
VirtualProtect
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcAddress
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
Sleep
TlsGetValue
user32
GetMenuStringW
GetCursorPos
FrameRect
AdjustWindowRect
InflateRect
ModifyMenuW
FindWindowExW
GetClassNameW
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
CreatePopupMenu
MessageBeep
AppendMenuW
KillTimer
TrackPopupMenu
CharNextW
GetKeyState
SetWindowLongW
GetWindowLongW
CallWindowProcW
SendMessageW
GetClientRect
ShowWindow
GetClassInfoExW
LoadCursorW
DefWindowProcW
SetTimer
MapVirtualKeyW
DestroyIcon
GetWindowPlacement
SetWindowPlacement
SetWindowTextW
MessageBoxW
PostMessageW
GetSystemMetrics
GetTopWindow
GetForegroundWindow
BringWindowToTop
GetWindow
EnumWindows
SendMessageTimeoutW
GetParent
MonitorFromWindow
GetMonitorInfoW
SetWindowPos
SystemParametersInfoW
IsWindowVisible
GetWindowRect
LoadIconW
MapWindowPoints
CopyRect
DestroyWindow
CreateWindowExW
RegisterClassExW
UnregisterClassA
msocf
?CreateTheApp@Frame@MsoCF@@YGXAAUCreateTheAppArgs@12@@Z
?TheApp@Frame@MsoCF@@YGPAUAFrameApp@2@XZ
?TerminateTheApp@Frame@MsoCF@@YGXXZ
?Finish@Frame@MsoCF@@YGXXZ
?Finish@Utilities@MsoCF@@YGXXZ
??0CToolbarData@MsoCF@@QAE@XZ
?Init@CToolbarData@MsoCF@@QAGXPBUStaticToolbarDesc@2@IPBUStaticMenuDesc@2@I@Z
?g_FixedBufferAllocator@MsoCF@@3VCFixedBufferAllocator@1@A
?SetWzFromNumber@Strings@MsoCF@@YGXAAV?$CWzInBuffer_T@V?$String@UWzTraits@MsoCF@@@MsoCF@@V?$CBuffer@_W@2@@2@IHHPAH@Z
?g_FastBufferAllocator@MsoCF@@3VCFastBufferAllocator@1@A
?AppendArrayOfCharactersToWz@Strings@MsoCF@@YGXPB_WHAAV?$CWzInBuffer_T@V?$String@UWzTraits@MsoCF@@@MsoCF@@V?$CBuffer@_W@2@@2@PAH@Z
?SetWzFromResource@Strings@MsoCF@@YGXAAV?$CWzInBuffer_T@V?$String@UWzTraits@MsoCF@@@MsoCF@@V?$CBuffer@_W@2@@2@PAUHINSTANCE__@@IPAH@Z
?CreateActionManager@MsoCF@@YGXPAPAUIActionManager@1@@Z
??1CToolbarData@MsoCF@@QAE@XZ
?Start@Utilities@MsoCF@@YGXHPAU_msotcfcf@@@Z
?Start@Frame@MsoCF@@YGXXZ
?SetWtzFromPattern@Strings@MsoCF@@YGXAAV?$CWtzInBuffer_Template@V?$CBuffer@_W@MsoCF@@@2@PAUHINSTANCE__@@IQAPB_WH@Z
?SetWzFromPattern@Strings@MsoCF@@YGXAAV?$CWzInBuffer_T@V?$String@UWzTraits@MsoCF@@@MsoCF@@V?$CBuffer@_W@2@@2@PAUHINSTANCE__@@IQAPB_WHPAH@Z
?Free@Allocator@Memory@MsoCF@@YGXPAX@Z
?TheActionManager@MsoCF@@YGPAUIActionManager@1@XZ
?Set@Properties@MsoCF@@YGXPAUIPropertySet@2@ABUPropertyInfo@2@PBXW4PropertyType@2@@Z
?LookupProperty@MsoCF@@YGABUPropertyInfo@1@I@Z
?FGet@Properties@MsoCF@@YG_NPAUIPropertySet@2@PBUPropertyInfo@2@PAXHW4PropertyType@2@@Z
?FreeAndZero_ComplexType@CPropertyData@MsoCF@@SGXPAXW4PropertyType@2@@Z
?ProduceAtom@MsoCF@@YGXPAPAVIAtom@1@PBXH@Z
?GetProperty@IPropertySet@MsoCF@@QAGXABUPropertyInfo@2@PAVCPropertyValue@2@@Z
?RegisterPropertySpace@MsoCF@@YGXPBUPropertySpaceInfo@1@@Z
msvcr80
_onexit
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_controlfp_s
_invoke_watson
_crt_debugger_hook
_except_handler4_common
_decode_pointer
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
??3@YAXPAX@Z
??_V@YAXPAX@Z
__CxxFrameHandler3
_CxxThrowException
??_U@YAPAXI@Z
swprintf_s
memset
_recalloc
??2@YAPAXI@Z
malloc
free
memcpy_s
wcsncpy_s
_vsnprintf
_vsnwprintf
memcpy
_wtoi
_wcsdup
_wtol
vswprintf_s
wcsrchr
wcscpy_s
vsprintf_s
fclose
fwprintf_s
fopen_s
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
oleaut32
VariantInit
SysFreeString
VarUI4FromStr
SysAllocString
VariantClear
shlwapi
PathCreateFromUrlW
AssocQueryStringW
shell32
CommandLineToArgvW
SHFileOperationW
wininet
InternetErrorDlg
HttpQueryInfoW
InternetOpenW
InternetReadFile
InternetCloseHandle
InternetOpenUrlW
urlmon
URLDownloadToFileW
ObtainUserAgentString
Sections
.text Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 576KB - Virtual size: 580KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE