tracerpt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
72ef543a57749be5a1f05f40c7cdbd39d371cdd77c53f6bdfb0c866f0e317077_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
72ef543a57749be5a1f05f40c7cdbd39d371cdd77c53f6bdfb0c866f0e317077_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
72ef543a57749be5a1f05f40c7cdbd39d371cdd77c53f6bdfb0c866f0e317077_NeikiAnalytics.exe
-
Size
280KB
-
MD5
d74768fd49a57d33c1ada3a047224970
-
SHA1
44fa38070f679f057de26f4afa6fa86a9a8db7fe
-
SHA256
72ef543a57749be5a1f05f40c7cdbd39d371cdd77c53f6bdfb0c866f0e317077
-
SHA512
61bb693ff5a70742ef998cbb7f1e9c17ab7e191a446bde14528df830c0c24574659aa77d6b8ea461d35c8855ea48ff13ded8d8798d76eafceb724a06e69382e5
-
SSDEEP
6144:z3rj6LeNCqChOIuGRtmIwJECoFjLeU/XUUT:OSkqChOZGRQIwJEC6jLeUc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 72ef543a57749be5a1f05f40c7cdbd39d371cdd77c53f6bdfb0c866f0e317077_NeikiAnalytics.exe
Files
-
72ef543a57749be5a1f05f40c7cdbd39d371cdd77c53f6bdfb0c866f0e317077_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
f669e086134239088f1b1940e23fb298
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegisterTraceGuidsW
StartTraceW
TraceEvent
LookupAccountSidA
LookupAccountSidW
OpenTraceW
ProcessTrace
CloseTrace
StopTraceW
kernel32
FindClose
FindNextFileW
FindFirstFileW
SetThreadLocale
GetSystemDefaultLCID
GetConsoleOutputCP
GetThreadLocale
GetUserDefaultUILanguage
LocalFree
WriteFile
WriteConsoleW
GetFileType
FormatMessageW
GetModuleHandleW
GetModuleFileNameW
ReadConsoleW
MultiByteToWideChar
ReadFile
SetConsoleMode
GetConsoleMode
CloseHandle
CreateFileW
SystemTimeToFileTime
FreeLibrary
LoadLibraryW
DeleteFileW
LockResource
LoadResource
FindResourceW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetVersionExA
ExitProcess
GetLastError
GetModuleHandleA
GetACP
GetOEMCP
GetCPInfo
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
WideCharToMultiByte
VirtualProtect
GetSystemInfo
VirtualQuery
LCMapStringA
LCMapStringW
RtlUnwind
InterlockedExchange
GetStringTypeA
GetStringTypeW
LoadLibraryA
VirtualAlloc
HeapReAlloc
SetFilePointer
GetLocaleInfoA
RaiseException
SetStdHandle
FlushFileBuffers
SetEndOfFile
Sleep
lstrlenA
FileTimeToLocalFileTime
FileTimeToSystemTime
SetLastError
ExpandEnvironmentStringsW
GetStringTypeExW
GetLocaleInfoW
SetConsoleTextAttribute
GetStdHandle
GetConsoleScreenBufferInfo
GetProcessHeap
HeapAlloc
HeapFree
GetProcAddress
SetEvent
lstrlenW
GetLocalTime
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
user32
LoadStringW
CharToOemW
wsprintfW
rpcrt4
UuidCreate
ole32
CoCreateInstance
CoInitialize
CoSetProxyBlanket
oleaut32
SafeArrayUnaccessData
VariantClear
SysAllocString
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SysFreeString
SafeArrayGetElement
VariantInit
VariantChangeType
SafeArrayDestroy
ntdll
RtlLeaveCriticalSection
RtlDeleteCriticalSection
RtlInitializeCriticalSection
RtlFreeUnicodeString
RtlStringFromGUID
RtlEnterCriticalSection
RtlAnsiCharToUnicodeChar
Sections
.text Size: 141KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 134KB - Virtual size: 135KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE