psr.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8054f60b5b57307eba088e9cebad6e33c631efa24d6bda0eb586d502f392c38f_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
8054f60b5b57307eba088e9cebad6e33c631efa24d6bda0eb586d502f392c38f_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
8054f60b5b57307eba088e9cebad6e33c631efa24d6bda0eb586d502f392c38f_NeikiAnalytics.exe
-
Size
706KB
-
MD5
6a27731c743524468cf4fb76cdc267e0
-
SHA1
3c3df8de9d679ec3f5d9e204a629e5007bcbc12f
-
SHA256
8054f60b5b57307eba088e9cebad6e33c631efa24d6bda0eb586d502f392c38f
-
SHA512
80766915873210d35542fd96a25bea7c86418f83efa89e63231694d7dc1bd3faf0b7944443f9945955d3b9f750b22c4d7264f7892f813cccaed24a7d978f8373
-
SSDEEP
12288:6YhNikHDq1XLwHYZgcD8pellpco/zENOeQiV1uc:6YhNikHGxLwHKApeCoAYeXV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8054f60b5b57307eba088e9cebad6e33c631efa24d6bda0eb586d502f392c38f_NeikiAnalytics.exe
Files
-
8054f60b5b57307eba088e9cebad6e33c631efa24d6bda0eb586d502f392c38f_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
ffade90db9adeb5900b8408b6a1b9815
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
TraceMessage
EventRegister
EventUnregister
ControlTraceW
EventWriteString
EnableTrace
StartTraceW
CloseTrace
ProcessTrace
OpenTraceW
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
RegisterTraceGuidsW
UnregisterTraceGuids
RegGetValueW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
LookupAccountNameW
OpenThreadToken
OpenProcessToken
GetTokenInformation
EqualSid
GetNamedSecurityInfoW
SetEntriesInAclW
SetNamedSecurityInfoW
RegOpenKeyW
RegQueryValueExW
kernel32
FindNextFileW
FindFirstFileW
MultiByteToWideChar
LoadLibraryW
ExpandEnvironmentStringsW
FreeLibrary
GetModuleFileNameW
DeleteFileW
CreateDirectoryW
RemoveDirectoryW
SetEvent
OpenEventW
RegisterWaitForSingleObject
lstrlenW
RaiseException
DeleteCriticalSection
lstrcmpiW
UnregisterWait
CreateThread
GetCurrentThreadId
InterlockedDecrement
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetCommandLineW
CreateProcessW
GetSystemDirectoryW
Wow64DisableWow64FsRedirection
IsWow64Process
GetCurrentProcess
HeapSetInformation
WideCharToMultiByte
GetSystemTime
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetTimeFormatW
GetVersionExW
GetProductInfo
MoveFileExW
WaitForMultipleObjects
InterlockedIncrement
GlobalUnlock
GlobalFree
TlsAlloc
GetCurrentDirectoryW
SetCurrentDirectoryW
DeleteFileA
LockResource
UnmapViewOfFile
WriteFile
GetDateFormatW
GetFileSize
CreateFileMappingW
MapViewOfFile
DuplicateHandle
SetLastError
WakeConditionVariable
GetCurrentThread
GetThreadPriority
InitializeConditionVariable
SleepConditionVariableCS
WakeAllConditionVariable
ResetEvent
SetThreadPriority
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
QueryFullProcessImageNameW
LocalFree
GetCurrentProcessId
ReadProcessMemory
OpenProcess
GetFileAttributesW
CreateFileW
GetProcAddress
TlsSetValue
GlobalAlloc
TlsFree
TlsGetValue
ReadFile
CreateFileA
IsDBCSLeadByte
lstrcmpA
SetFilePointer
GetFileInformationByHandle
SetFileAttributesW
GetFileAttributesExW
ReplaceFileW
FileTimeToDosDateTime
GetFileAttributesExA
CreateEventW
CloseHandle
Sleep
GetModuleHandleW
GetLastError
InterlockedCompareExchange
HeapAlloc
WaitForSingleObject
GlobalLock
GlobalReAlloc
GetDriveTypeA
FindNextFileA
FindFirstFileA
OutputDebugStringA
UnhandledExceptionFilter
TerminateProcess
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoW
lstrlenA
lstrcmpiA
GlobalHandle
InterlockedExchange
GetVersionExA
GetTickCount
InitializeCriticalSection
GetProcessHeap
HeapFree
LeaveCriticalSection
EnterCriticalSection
FindClose
gdi32
BitBlt
CreateCompatibleBitmap
CreateDCW
StretchBlt
CreateSolidBrush
ExcludeClipRect
CreateCompatibleDC
CreateDIBSection
GetCurrentObject
CreatePen
SelectObject
GetStockObject
Rectangle
DeleteObject
DeleteDC
GetObjectW
user32
GetSysColorBrush
SetForegroundWindow
DialogBoxParamW
SetCapture
ClientToScreen
ReleaseCapture
EndPaint
FillRect
IsRectEmpty
BeginPaint
SetWindowLongW
InvalidateRect
GetCursorPos
LoadIconW
GetDlgItem
RedrawWindow
SetDlgItemTextW
SendDlgItemMessageW
GetDlgItemInt
GetDlgItemTextW
SetDlgItemInt
SetFocus
DefWindowProcW
EndDialog
KillTimer
LoadCursorW
GetWindowTextW
GetWindowTextLengthW
IsDialogMessageW
CreateDialogParamW
SetTimer
UpdateWindow
MapWindowPoints
LoadMenuW
GetSubMenu
DestroyMenu
EnableMenuItem
TrackPopupMenu
RegisterClassExW
SetCursorPos
FindWindowW
SendInput
CharNextW
DispatchMessageW
TranslateMessage
GetMessageW
PostThreadMessageW
CharUpperW
IsHungAppWindow
CharLowerA
GetDesktopWindow
UnregisterClassA
OemToCharBuffA
CharPrevA
EnableWindow
CharUpperBuffA
SetProcessDefaultLayout
SetLayeredWindowAttributes
CopyImage
MsgWaitForMultipleObjectsEx
PeekMessageW
EnumChildWindows
DispatchMessageA
PeekMessageA
CharNextA
CharToOemBuffA
PostMessageW
SetMenuInfo
SetMenuItemInfoW
GetProcessDefaultLayout
DestroyIcon
UnregisterClassW
IsWindowVisible
SetParent
GetClientRect
MoveWindow
AdjustWindowRect
SendMessageW
DestroyWindow
SystemParametersInfoW
CreateWindowExW
MessageBoxW
LoadStringW
SetWindowTextW
DrawIcon
ShowWindow
SetWindowPos
SetWindowsHookExW
CallNextHookEx
PostQuitMessage
GetGUIThreadInfo
WindowFromPoint
GetWindowThreadProcessId
UnhookWindowsHookEx
GetDoubleClickTime
GetWindowInfo
GetWindowLongW
GetParent
GetSystemMetrics
GetAsyncKeyState
PtInRect
LoadImageW
GetCursorInfo
InternalGetWindowText
GetClassNameW
GetWindowRect
GetKeyState
MapVirtualKeyW
GetKeyNameTextW
GetDC
ReleaseDC
GetIconInfo
msvcrt
_vsnwprintf
memset
_vsnprintf
_wcsicmp
__CxxFrameHandler3
_itow_s
wcsstr
_wcsupr
wcstoul
strncmp
_controlfp
_onexit
_lock
__dllonexit
_unlock
_errno
realloc
_except_handler4_common
??1type_info@@UAE@XZ
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
calloc
_callnewh
_wtoi
_purecall
wcscat_s
wcsncpy_s
wcscpy_s
_CxxThrowException
memcpy_s
free
malloc
_wcstoui64
wcstol
wcschr
memcpy
_vscwprintf
_ftol2
_mktemp
strstr
qsort
localtime
gmtime
time
memmove
_getdrive
ntdll
NtQueryInformationProcess
EtwEventRegister
EtwEventWrite
EtwEventUnregister
oleaut32
RegisterTypeLi
VarUI4FromStr
SysStringLen
VariantInit
VariantClear
SysFreeString
UnRegisterTypeLi
SysAllocString
VariantChangeType
LoadRegTypeLi
LoadTypeLi
ole32
StringFromGUID2
CoInitializeEx
CoCreateInstance
CoUninitialize
CoCreateGuid
CoTaskMemAlloc
CoTaskMemRealloc
CoInitialize
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemFree
oleacc
GetRoleTextW
AccessibleObjectFromPoint
AccessibleObjectFromWindow
WindowFromAccessibleObject
comctl32
ImageList_Create
HIMAGELIST_QueryInterface
InitCommonControlsEx
ord381
ImageList_ReplaceIcon
ImageList_GetIcon
ImageList_Destroy
shlwapi
PathUnquoteSpacesW
PathGetArgsW
PathIsDirectoryW
ord218
ord216
PathIsSameRootW
PathAppendW
PathMatchSpecExA
SHAutoComplete
PathFindFileNameA
ord197
PathAddExtensionW
SHCreateStreamOnFileEx
PathRemoveBlanksW
PathRemoveExtensionW
PathRemoveBackslashW
PathCombineW
PathFileExistsW
PathFindExtensionW
PathFindFileNameW
PathRemoveFileSpecW
PathRemoveArgsW
shell32
ord171
CommandLineToArgvW
ord727
ShellExecuteExW
SHGetSpecialFolderPathW
SHCreateItemFromParsingName
SHCreateItemInKnownFolder
ShellAboutW
ord245
msdrm
DRMIsWindowProtected
xmllite
CreateXmlWriter
gdiplus
GdiplusStartup
GdipCloneImage
GdipGetImageEncoders
GdipGetImageEncodersSize
GdiplusShutdown
GdipSaveImageToFile
GdipDisposeImage
GdipAlloc
GdipFree
GdipCreateBitmapFromHBITMAP
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
msimg32
AlphaBlend
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationW
Sections
.text Size: 187KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 473KB - Virtual size: 473KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 39KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE