DFDWiz.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5f1ed6a0051506865986d9482c2670416cfba7923bd1af7d41758ceca3ba7d25_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
5f1ed6a0051506865986d9482c2670416cfba7923bd1af7d41758ceca3ba7d25_NeikiAnalytics.exe
-
Size
76KB
-
MD5
bbb89dcb75966124433166ceb3c137f0
-
SHA1
c8b8bb3c791f7aa6fffde4b1ffd0d91e9cc64153
-
SHA256
5f1ed6a0051506865986d9482c2670416cfba7923bd1af7d41758ceca3ba7d25
-
SHA512
8e8b43827249b7283740a6890dccd346919b99f3d80a477cfcf7abbd642dc95b5420f4754328f24ddd918b4ef0840d5c061ee7c54f46f76e4264fe87fa8f0ccf
-
SSDEEP
768:edP68SBOoIBiRbxJLn8qy61HRO4uX18WYoLJuZUtTpCj1MPWGNdb/GS:edSJLh1xfkVppNF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5f1ed6a0051506865986d9482c2670416cfba7923bd1af7d41758ceca3ba7d25_NeikiAnalytics.exe
Files
-
5f1ed6a0051506865986d9482c2670416cfba7923bd1af7d41758ceca3ba7d25_NeikiAnalytics.exe.exe windows:10 windows x64 arch:x64
6a73ca60b481df35c069d7a319044450
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
TraceMessage
OpenProcessToken
RegOpenKeyExW
EventWrite
RegQueryInfoKeyW
RegCloseKey
RegEnumKeyExW
RegDeleteKeyW
ConvertStringSecurityDescriptorToSecurityDescriptorW
LookupPrivilegeValueW
AdjustTokenPrivileges
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
RegisterTraceGuidsW
UnregisterTraceGuids
EventRegister
EventUnregister
RegEnumValueW
kernel32
GetCurrentThreadId
HeapAlloc
GetCurrentProcess
CreateFileW
HeapFree
OpenMutexW
GetProcAddress
LocalFree
GetVersionExW
FormatMessageW
GetProcessHeap
HeapSetInformation
RegisterApplicationRestart
Sleep
CloseHandle
OutputDebugStringA
QueryActCtxW
GetModuleHandleExW
GetModuleFileNameW
CreateActCtxW
FindActCtxSectionStringW
LoadLibraryW
ActivateActCtx
GetLastError
DeactivateActCtx
CreateMutexW
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
SetLastError
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetTickCount
DeviceIoControl
FindFirstVolumeW
FindNextVolumeW
FindVolumeClose
GetVolumePathNamesForVolumeNameW
user32
MessageBoxW
msvcrt
__C_specific_handler
_vsnwprintf
memcmp
_callnewh
free
_XcptFilter
_amsg_exit
_wcsicmp
malloc
?terminate@@YAXXZ
_commode
_fmode
_acmdln
memset
_initterm
__setusermatherr
_ismbblead
_cexit
_exit
exit
__set_app_type
__getmainargs
__CxxFrameHandler4
memcpy
ole32
CoCreateGuid
CoCreateInstance
CoUninitialize
CoInitializeEx
StringFromGUID2
ntdll
RtlCaptureContext
RtlVirtualUnwind
WinSqmAddToStream
WinSqmEndSession
WinSqmStartSession
WinSqmSetDWORD
RtlLookupFunctionEntry
setupapi
SetupDiEnumDeviceInterfaces
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsW
SetupDiGetDeviceRegistryPropertyW
SetupDiGetDeviceInterfaceDetailW
oleaut32
SysFreeString
SysAllocString
VariantInit
VariantClear
Sections
.text Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
fothk Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 152B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ