f:\MyProgram\Microsoft\MyProjects\Virus\Hack\Win32\WinOnly\Release\WinOnly.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8378638bbb98d95290b51c45675814335802defd0c19ce7e751925fa19f99639_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
8378638bbb98d95290b51c45675814335802defd0c19ce7e751925fa19f99639_NeikiAnalytics.exe
-
Size
90KB
-
MD5
80d2a1552f4db9890d2c2dc118f02040
-
SHA1
e8d9056fb113d088dc68e622479e29a0fbdc907d
-
SHA256
8378638bbb98d95290b51c45675814335802defd0c19ce7e751925fa19f99639
-
SHA512
49c2c6b34c288ea8a1022e55fbab96a1ac6c15ad2a3048cfbeff1191dcfd476006b3bdcb3b485925cc5a6fb388e0617a929e409aabeb9c889bba8d7c9651ef7e
-
SSDEEP
768:f6F85fJTL9dKzMomchzSyohdjTRg5EZl3HQbfEDOKS++ojbVOOf:Sq51WzMvcdSywJdjl3wFs+dOf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8378638bbb98d95290b51c45675814335802defd0c19ce7e751925fa19f99639_NeikiAnalytics.exe
Files
-
8378638bbb98d95290b51c45675814335802defd0c19ce7e751925fa19f99639_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
eb050ef47e0a6db21a31636bee3f076f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CloseHandle
ReadFile
CreateFileA
SetFilePointer
WriteFile
FindFirstFileA
DeleteFileA
SetFileAttributesA
GetCommandLineA
MoveFileA
CopyFileA
FindClose
FindNextFileA
ResumeThread
CreateThread
SuspendThread
Sleep
WaitForSingleObject
CreateSemaphoreA
WinExec
GetSystemDirectoryA
GetWindowsDirectoryA
ExitProcess
GetModuleHandleA
GetStartupInfoA
GetVersionExA
HeapAlloc
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
HeapFree
GetProcAddress
TerminateProcess
GetCurrentProcess
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
LoadLibraryA
RtlUnwind
InterlockedExchange
VirtualQuery
GetACP
GetOEMCP
GetCPInfo
HeapSize
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualProtect
GetSystemInfo
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vsp Size: - Virtual size: 1B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE