D:\Icesofts\IIME\Iimuni\Release\Iimuni.pdb
Static task
static1
Behavioral task
behavioral1
Sample
699e42e9541ed70a2d87c4641000223c4f755a648f4ac9e1b72b44bfaa8f80a5_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
699e42e9541ed70a2d87c4641000223c4f755a648f4ac9e1b72b44bfaa8f80a5_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
699e42e9541ed70a2d87c4641000223c4f755a648f4ac9e1b72b44bfaa8f80a5_NeikiAnalytics.exe
-
Size
150KB
-
MD5
dc9be9c0462b336be1f1f0bf20bd9090
-
SHA1
a22755df384513f5b4fc9f3d215733a5ec8f5d09
-
SHA256
699e42e9541ed70a2d87c4641000223c4f755a648f4ac9e1b72b44bfaa8f80a5
-
SHA512
5431145df6d2b16281328e0b9bcaf5d7094db8aa3f3d0b62ad857e114cafbb795d34f233b13f68bdaffe27df3b4e9ab48cf0dbabf3d5c9b04ac561a8d82e2440
-
SSDEEP
3072:V4WyMbwSt4IojarKVSduIRujDlrbRAXwAPDLP4mt:OWyYT3KwddR6c3HQmt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 699e42e9541ed70a2d87c4641000223c4f755a648f4ac9e1b72b44bfaa8f80a5_NeikiAnalytics.exe
Files
-
699e42e9541ed70a2d87c4641000223c4f755a648f4ac9e1b72b44bfaa8f80a5_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
e3b187eb2cb7e4593dc22b73ba25265a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
DeleteCriticalSection
DecodePointer
HeapAlloc
HeapReAlloc
GetLastError
ExitProcess
InitializeCriticalSectionEx
GetModuleFileNameW
lstrlenW
GetCurrentProcess
GetProcessHeap
HeapSize
lstrcmpiW
HeapFree
CreateDirectoryW
WriteConsoleW
ReadFile
FindFirstFileW
FindNextFileW
WriteFile
FindClose
CreateFileW
GetSystemDirectoryW
GetSystemDefaultLangID
lstrcatW
CloseHandle
GetSystemInfo
GetProcAddress
LocalFree
VerSetConditionMask
GetModuleHandleW
FreeLibrary
lstrcpyW
VerifyVersionInfoW
lstrcmpW
GetCurrentThreadId
SetFileAttributesW
MultiByteToWideChar
DeleteFileW
LoadLibraryW
MoveFileExW
WideCharToMultiByte
SetNamedPipeHandleState
PeekNamedPipe
WaitNamedPipeW
IsDebuggerPresent
OutputDebugStringW
RaiseException
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
SetLastError
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetModuleHandleExW
GetStdHandle
LCMapStringW
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetFileType
SetStdHandle
GetStringTypeW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
user32
GetDesktopWindow
wsprintfW
MessageBoxW
shell32
ord75
SHFileOperationW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetSpecialFolderPathW
ole32
CoInitializeEx
CLSIDFromString
CoInitialize
CoCreateInstance
CoTaskMemFree
CoUninitialize
shlwapi
PathRemoveFileSpecW
PathFileExistsW
PathAppendW
PathFindFileNameW
StrChrW
advapi32
RegQueryValueExW
RegEnumKeyExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
OpenServiceW
RegOpenKeyExW
RegDeleteTreeW
ControlService
DeleteService
RegDeleteKeyValueW
RegDeleteKeyW
OpenSCManagerW
CloseServiceHandle
RegCloseKey
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ