D:\builds\build-sourcemod-msvc12\windows-1.11\OUTPUT\core\sourcemod.2.bms\windows-x86\sourcemod.2.bms.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8b02990568298ea8549510b7831d568879e5ad9433767840d61e6425bc8b2e55_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8b02990568298ea8549510b7831d568879e5ad9433767840d61e6425bc8b2e55_NeikiAnalytics.dll
Resource
win10v2004-20240611-en
General
-
Target
8b02990568298ea8549510b7831d568879e5ad9433767840d61e6425bc8b2e55_NeikiAnalytics.exe
-
Size
495KB
-
MD5
05dd384b72c570e451efd3ce3012beb0
-
SHA1
c356d8b937c2c3fb3a509807dfccdb46dc6e34d4
-
SHA256
8b02990568298ea8549510b7831d568879e5ad9433767840d61e6425bc8b2e55
-
SHA512
46c9f6a2bcfce2e08af2674cb669a6106bf279560a220595d5cda534624cc0fb0ee48fcc26a5aff91ea02c5670602d4eb1f1a6c05c3cfcead3d4925d03374820
-
SSDEEP
6144:OqSDhc1V7Lu7D49X9UXtd8mdhwje7BzNRO7gakYcV8Eo/AO6JAlOI:ORDhc1V7Lm89AbHwjkBzNUVKyJOI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8b02990568298ea8549510b7831d568879e5ad9433767840d61e6425bc8b2e55_NeikiAnalytics.exe
Files
-
8b02990568298ea8549510b7831d568879e5ad9433767840d61e6425bc8b2e55_NeikiAnalytics.exe.dll windows:5 windows x86 arch:x86
d31427310e70561a5404467d43de6bec
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetFileAttributesA
GetLastError
FreeLibrary
GetProcAddress
FormatMessageA
LoadLibraryA
ReadConsoleW
ReadFile
SetEndOfFile
SetFilePointerEx
HeapReAlloc
HeapSize
CreateFileW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
CreateDirectoryW
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetCurrentThreadId
MultiByteToWideChar
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
CloseHandle
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
RaiseException
RtlUnwind
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
InterlockedFlushSList
SetLastError
GetStdHandle
GetFileType
GetModuleFileNameA
GetModuleHandleExW
WriteConsoleW
ExitProcess
HeapFree
HeapAlloc
GetACP
LCMapStringW
GetStringTypeW
DecodePointer
WriteFile
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
tier0
MemAllocScratch
g_VProfCurrentProfile
?OutputReport@CVProfile@@QAEXHPBDH@Z
?Pause@CVProfile@@QAEXXZ
?ExitScope@CVProfile@@QAEXXZ
?EnterScope@CVProfile@@QAEXPBDH0_NH@Z
?Resume@CVProfNode@@QAEXXZ
g_pMemAlloc
Warning
GetSpewOutputFunc
SpewOutputFunc
MemFreeScratch
DevMsg
?DevMsg@@YAXPBDZZ
vstdlib
RandomFloat
RandomInt
KeyValuesSystem
RandomSeed
Exports
Exports
CreateInterface
cvar
Sections
.text Size: 357KB - Virtual size: 357KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 284B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 856B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ