I:\Dev\Check\ProcessHacker\trunk\bin\Release64\plugins\ROTViewerPlugin.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3569249517528acf8f9d874131281223d6f3022bc4ab2880d23072b46ec6301d_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3569249517528acf8f9d874131281223d6f3022bc4ab2880d23072b46ec6301d_NeikiAnalytics.dll
Resource
win10v2004-20240226-en
General
-
Target
3569249517528acf8f9d874131281223d6f3022bc4ab2880d23072b46ec6301d_NeikiAnalytics.exe
-
Size
106KB
-
MD5
ce3f105bf025ffd79aad94ead0caeff0
-
SHA1
42ebe6844db9b7d9665c862d2a29537f9a689718
-
SHA256
3569249517528acf8f9d874131281223d6f3022bc4ab2880d23072b46ec6301d
-
SHA512
28d3ff13484eb2475cf66b61d7b27a89f6321d40e4f8b7d009c90e3ce0b8c5a1b4d9bd4730024f8ba0d9ea6df83e462b070ca5c7cb6d668e6a9f846ca720c818
-
SSDEEP
3072:J2HuTF+1KOoApb8EAtpFrpqpqpvg+39R2/rT:GuTYvoApbQerT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3569249517528acf8f9d874131281223d6f3022bc4ab2880d23072b46ec6301d_NeikiAnalytics.exe
Files
-
3569249517528acf8f9d874131281223d6f3022bc4ab2880d23072b46ec6301d_NeikiAnalytics.exe.dll windows:6 windows x64 arch:x64
278fe319e41f164e7a369c680025b1b4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
processhacker.exe
PhInsertEMenuItem
PhSetWindowContext
PhInitializeLayoutManager
PhDeleteLayoutManager
PhSetControlTheme
PhAllocate
PhPluginCreateEMenuItem
PhSaveWindowPlacementToSetting
PhSetExtendedListView
PhFindEMenuItem
PhAddListViewColumn
PhAddSettings
PhRegisterDialog
PhGetGeneralCallback
PhUnregisterDialog
PhGetWindowContext
PhLoadWindowPlacementFromSetting
PhCreateThread2
PhAddLayoutItem
PhAddListViewItem
PhRegisterCallback
PhFree
PhRegisterPlugin
PhGetPluginCallback
PhLayoutManagerLayout
PhRemoveWindowContext
user32
SendMessageW
GetDlgItem
DialogBoxParamW
EndDialog
ole32
GetRunningObjectTable
CoGetMalloc
CreateBindCtx
ntdll
RtlVirtualUnwind
RtlUnwindEx
RtlLookupFunctionEntry
RtlPcToFileHeader
RtlCaptureContext
kernel32
TlsAlloc
GetFileType
GetStdHandle
GetProcessHeap
LCMapStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
WriteConsoleW
CloseHandle
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
WriteFile
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
InterlockedFlushSList
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
IsValidCodePage
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
EncodePointer
RaiseException
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
GetStringTypeW
Sections
.text Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 800B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ