D:\DCB\CBT_Main\BuildResults\bin\Release\TextExtractor.pdb
Static task
static1
Behavioral task
behavioral1
Sample
22ada35754706d8dec61e4fb7ac50be34f3eb63f3c4f21141c6bf012f6748241_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
22ada35754706d8dec61e4fb7ac50be34f3eb63f3c4f21141c6bf012f6748241_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
22ada35754706d8dec61e4fb7ac50be34f3eb63f3c4f21141c6bf012f6748241_NeikiAnalytics.exe
-
Size
605KB
-
MD5
36e660748c209891b7db99535563a450
-
SHA1
cfebc496cccc80b1910de050f974a7048fdf09c5
-
SHA256
22ada35754706d8dec61e4fb7ac50be34f3eb63f3c4f21141c6bf012f6748241
-
SHA512
bcdd563c6e424ad0b6e7c6987946596932bbb177c69bc36e5079bf29922ee3286687a89338eb133e1b4a574efabccd2c2bf13c6b1ace5b73003865f9ebf2aa68
-
SSDEEP
12288:HmyndwCg6/xjPHFFBwpRDftD7IBUgbScDQCSkb6wjfRMVviOvf7sibN3A1G31f9:Hme1g6p7HF/w/ftDsBUiScD7WGfWVbvd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 22ada35754706d8dec61e4fb7ac50be34f3eb63f3c4f21141c6bf012f6748241_NeikiAnalytics.exe
Files
-
22ada35754706d8dec61e4fb7ac50be34f3eb63f3c4f21141c6bf012f6748241_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
cb771c3103545dd6ca47833368587c98
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
query
LoadIFilter
kernel32
GetLongPathNameW
SetErrorMode
GetCurrentProcess
GetModuleHandleA
GetProcAddress
LocalFree
VerSetConditionMask
CloseHandle
GetCommandLineW
ResetEvent
OpenEventW
WaitForMultipleObjects
OpenProcess
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
VerifyVersionInfoW
GetSystemTimeAsFileTime
GetTickCount
MultiByteToWideChar
SetEvent
GetLastError
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
shell32
CommandLineToArgvW
ole32
CoInitialize
CoUninitialize
oleaut32
VariantClear
SysAllocString
SysFreeString
SysStringLen
shlwapi
PathIsRelativeW
PathIsDirectoryW
PathFindExtensionW
PathFileExistsW
PathAddBackslashW
msvcp140
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEPADXZ
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXXZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UAE@XZ
?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@PBD_J@Z
??0?$basic_istream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ
?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@PAD_J@Z
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ
?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEXABVlocale@2@@Z
?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEPAV12@PAD_J@Z
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JXZ
?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ
?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPBD_J@Z
??1?$basic_istream@DU?$char_traits@D@std@@@std@@UAE@XZ
?_Xlength_error@std@@YAXPBD@Z
vcruntime140
__std_terminate
__current_exception_context
__current_exception
_except_handler4_common
memset
memmove
__CxxFrameHandler3
_CxxThrowException
__std_exception_destroy
__std_exception_copy
memcpy
api-ms-win-crt-runtime-l1-1-0
_invalid_parameter_noinfo_noreturn
terminate
_c_exit
_exit
exit
_initterm_e
_initterm
_register_thread_local_exe_atexit_callback
_get_narrow_winmain_command_line
_set_app_type
_register_onexit_function
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
_seh_filter_exe
_cexit
_crt_atexit
_controlfp_s
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
malloc
_callnewh
api-ms-win-crt-string-l1-1-0
_wcsnicmp
strlen
wcslen
_wcsicmp
wcscpy_s
_wcslwr
api-ms-win-crt-filesystem-l1-1-0
_wfullpath
_splitpath_s
_fullpath
api-ms-win-crt-multibyte-l1-1-0
_mbschr
_mbslwr
api-ms-win-crt-stdio-l1-1-0
__p__commode
__stdio_common_vswscanf
_set_fmode
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE