C:\u\workspace\nViewBranchBuilder\sw\nview\v148\_out\x64-Release\nvwdmcpl.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6ffcc6035d345a7a180ecc0f546e0428e715122b4e9f97c926426bde7f827036_NeikiAnalytics.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
6ffcc6035d345a7a180ecc0f546e0428e715122b4e9f97c926426bde7f827036_NeikiAnalytics.dll
Resource
win10v2004-20240611-en
General
-
Target
6ffcc6035d345a7a180ecc0f546e0428e715122b4e9f97c926426bde7f827036_NeikiAnalytics.exe
-
Size
2.5MB
-
MD5
8f82043807d3da487bba8be3e566a260
-
SHA1
e7567fb27269f14e2e8733835151c9596ab47343
-
SHA256
6ffcc6035d345a7a180ecc0f546e0428e715122b4e9f97c926426bde7f827036
-
SHA512
ff21d8abdea285e7171c612f35621d82bda0ff463c1e2c1055bdc4cbb33d2ab8ba0b4e1e80c15c407a0b87360a57b693e42f6605436122a479c0d409318b06a1
-
SSDEEP
49152:3ER+EbS1V2o8hbvCtMQSs1deaR5BeVBexbsF:6xhbvCttSs1dnR5BeVBexA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6ffcc6035d345a7a180ecc0f546e0428e715122b4e9f97c926426bde7f827036_NeikiAnalytics.exe
Files
-
6ffcc6035d345a7a180ecc0f546e0428e715122b4e9f97c926426bde7f827036_NeikiAnalytics.exe.dll windows:6 windows x64 arch:x64
a2413f9b9dd0835ce689db7fbfc06f76
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
msimg32
TransparentBlt
uxtheme
IsAppThemed
kernel32
VerSetConditionMask
ReadConsoleW
SetEndOfFile
WriteConsoleW
SetStdHandle
GetStringTypeW
SetFilePointerEx
LoadLibraryExW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
SetConsoleCtrlHandler
HeapReAlloc
GetConsoleMode
GetConsoleCP
FlushFileBuffers
FatalAppExitA
ExpandEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetModuleFileNameA
GetFileType
WriteFile
GetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
CreateSemaphoreW
GetTickCount
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
CreateEventW
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
SetLastError
GetProcessHeap
HeapSize
WideCharToMultiByte
AreFileApisANSI
GetModuleHandleExW
ExitProcess
GetLocalTime
GetCommandLineA
HeapAlloc
IsProcessorFeaturePresent
RtlUnwindEx
RtlLookupFunctionEntry
RtlPcToFileHeader
HeapFree
EncodePointer
LeaveCriticalSection
EnterCriticalSection
IsDebuggerPresent
WaitForSingleObject
ReleaseMutex
LocalAlloc
GetCurrentThread
GetModuleFileNameW
CreateMutexW
GetFullPathNameW
ExpandEnvironmentStringsA
GetProcAddress
LoadLibraryExA
GetUserDefaultUILanguage
GetLocaleInfoW
SizeofResource
lstrcatW
lstrcpyW
CopyFileW
lstrcmpiW
FormatMessageW
LocalFree
CreateThread
MulDiv
GetWindowsDirectoryW
GetSystemDirectoryW
CloseHandle
ReadFile
GetFileSize
CreateFileW
DisableThreadLibraryCalls
MultiByteToWideChar
GetCurrentThreadId
Sleep
lstrcmpW
GetUserDefaultLangID
FindResourceW
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
VerifyVersionInfoW
LockResource
LoadResource
FreeResource
lstrlenW
DeleteCriticalSection
InitializeCriticalSectionEx
GetLastError
RaiseException
DecodePointer
CreateProcessA
CreateProcessW
lstrcmpA
FreeEnvironmentStringsW
OutputDebugStringW
GetTempPathW
IsWow64Process
GetCurrentProcess
GetVersionExW
GetFileAttributesW
LoadLibraryW
GetCurrentProcessId
AcquireSRWLockShared
AcquireSRWLockExclusive
ReleaseSRWLockShared
ReleaseSRWLockExclusive
FindFirstFileW
FindClose
lstrcpynW
OpenProcess
K32EnumProcessModules
K32GetModuleBaseNameW
GetModuleHandleW
FreeLibrary
user32
SetLayeredWindowAttributes
GetWindowLongW
GetMessageTime
GetMonitorInfoW
MonitorFromRect
MapDialogRect
IsDialogMessageW
GetWindow
RedrawWindow
GetFocus
CreateDialogIndirectParamW
IsWindowVisible
GetWindowPlacement
RegisterClassExW
PostQuitMessage
DefWindowProcW
DispatchMessageW
TranslateMessage
GetMessageW
RegisterWindowMessageW
MessageBeep
wsprintfW
PtInRect
KillTimer
SetTimer
GetMessagePos
EnumChildWindows
SetClassLongPtrW
GetClassLongPtrW
OffsetRect
GetSysColorBrush
ClientToScreen
GetCursor
SetWindowPos
SystemParametersInfoW
GetDesktopWindow
GetWindowLongPtrW
GetWindowTextW
EndPaint
BeginPaint
GetSystemMetrics
CreateWindowExW
PostMessageW
DrawIconEx
LoadIconW
LoadCursorW
FillRect
ChildWindowFromPointEx
WindowFromPoint
ScreenToClient
GetCursorPos
SetCursor
InvalidateRect
UpdateWindow
DrawTextW
ReleaseCapture
SetCapture
CharPrevW
CharLowerW
SendMessageW
MapVirtualKeyW
GetKeyNameTextW
SetFocus
GetDialogBaseUnits
IsDlgButtonChecked
CheckDlgButton
GetDlgItemTextW
SetDlgItemTextW
EndDialog
ShowWindow
DestroyWindow
GetForegroundWindow
RegisterShellHookWindow
SetForegroundWindow
CopyIcon
SetWindowLongW
IsZoomed
GetDlgCtrlID
IntersectRect
UnionRect
IsIconic
LoadStringW
DialogBoxParamW
LoadMenuIndirectW
EnumDisplaySettingsW
EnumDisplayDevicesW
MonitorFromWindow
IsHungAppWindow
IsRectEmpty
MonitorFromPoint
SetProcessDPIAware
GetAncestor
GetWindowThreadProcessId
GetClassNameW
EnumWindows
FindWindowW
BringWindowToTop
IsWindow
AttachThreadInput
LoadBitmapW
GetParent
SetWindowLongPtrW
MapWindowPoints
GetWindowRect
GetClientRect
IsWindowEnabled
GetKeyState
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
SendDlgItemMessageW
MoveWindow
CallWindowProcW
GetSysColor
ReleaseDC
GetDC
LoadImageW
DestroyIcon
SetWindowTextW
EnableWindow
UnregisterClassW
GetDlgItem
DrawFocusRect
gdi32
StretchBlt
GetDeviceCaps
DeleteObject
DeleteDC
CreatePalette
CreateDIBitmap
CreateCompatibleDC
BitBlt
GetPixel
Rectangle
GetObjectW
GetStockObject
SetBkMode
SetTextColor
CreateSolidBrush
SetBkColor
GetTextMetricsW
SelectObject
CreateBitmap
CreateCompatibleBitmap
CreateFontIndirectW
CreatePen
CreatePatternBrush
GetMapMode
LineTo
PatBlt
SetMapMode
SetStretchBltMode
MoveToEx
SetBrushOrgEx
MaskBlt
CreateBrushIndirect
GetTextExtentPoint32W
TextOutW
ExtTextOutW
SelectPalette
RealizePalette
comdlg32
GetOpenFileNameW
advapi32
RegQueryValueExA
RegOpenKeyExA
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
DeregisterEventSource
RegisterEventSourceW
ReportEventW
OpenProcessToken
OpenThreadToken
AccessCheck
AddAccessAllowedAce
AllocateAndInitializeSid
CheckTokenMembership
CreateWellKnownSid
FreeSid
GetLengthSid
GetTokenInformation
ImpersonateSelf
InitializeAcl
InitializeSecurityDescriptor
IsValidSecurityDescriptor
RevertToSelf
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
RegEnumKeyExW
RegSetKeySecurity
RegOpenCurrentUser
SetEntriesInAclW
GetSecurityDescriptorSacl
shell32
ExtractIconExW
ord62
SHBrowseForFolderW
SHGetPathFromIDListW
ShellExecuteW
ExtractIconW
ole32
CoUninitialize
CreateStreamOnHGlobal
CoInitialize
CoAllowSetForegroundWindow
CoInitializeEx
CoCreateInstance
oleaut32
OleLoadPicture
SysFreeString
shlwapi
SHDeleteKeyW
Exports
Exports
nViewMain
Sections
.text Size: 703KB - Virtual size: 703KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 197KB - Virtual size: 196KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ