PerfHost.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8cb733b372cd5c6053d5f2f155174e56b325a862885e9d9225f458142a6c6157_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
8cb733b372cd5c6053d5f2f155174e56b325a862885e9d9225f458142a6c6157_NeikiAnalytics.exe
-
Size
161KB
-
MD5
3dea7b4c09f350835381356a64187070
-
SHA1
0d6354b99ca5016975330f5e95d67cb006a58917
-
SHA256
8cb733b372cd5c6053d5f2f155174e56b325a862885e9d9225f458142a6c6157
-
SHA512
e83fb97ff256d543e1b39ddc9acd4bf0d64c45569b778192341e847827bd9b7962212d478b33666e1a12547f55b48b32a0d5c9c43f7a2477c8ed22bbab23a2cf
-
SSDEEP
3072:JXNEqRbSUktHP77TYCmo4dihpjWzqIzXBJEoch9qH0:x3kzUihpjWjEkH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8cb733b372cd5c6053d5f2f155174e56b325a862885e9d9225f458142a6c6157_NeikiAnalytics.exe
Files
-
8cb733b372cd5c6053d5f2f155174e56b325a862885e9d9225f458142a6c6157_NeikiAnalytics.exe.exe windows:10 windows x86 arch:x86
8d5844fd312e4b4de80e5a985c8df3ac
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_initterm
__setusermatherr
__p__fmode
_cexit
_exit
exit
_amsg_exit
__set_app_type
free
_vsnwprintf
__wgetmainargs
__p__commode
__CxxFrameHandler3
malloc
_callnewh
memcpy
_except_handler4_common
_controlfp
_XcptFilter
?terminate@@YAXXZ
memset
ntdll
NtClose
NtQueryInformationToken
RtlNtStatusToDosError
NtOpenThreadToken
EtwEventWrite
RtlExpandEnvironmentStrings
EtwEventRegister
RtlReleaseSRWLockShared
RtlAcquireSRWLockShared
RtlReleaseSRWLockExclusive
RtlAcquireSRWLockExclusive
EtwEventUnregister
rpcrt4
RpcEpRegisterW
RpcRevertToSelf
RpcServerInqBindings
RpcServerRegisterIfEx
RpcServerUseProtseqW
RpcServerUnregisterIf
RpcBindingVectorFree
RpcEpUnregister
RpcStringFreeW
RpcStringBindingParseW
RpcBindingToStringBindingW
RpcBindingInqAuthClientW
RpcImpersonateClient
NdrServerCall2
api-ms-win-core-errorhandling-l1-1-0
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetLastError
api-ms-win-core-heap-l1-1-0
HeapSetInformation
api-ms-win-core-libraryloader-l1-2-0
GetModuleHandleW
GetProcAddress
FreeLibrary
LoadLibraryExW
api-ms-win-core-registry-l1-1-0
RegQueryValueExA
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
api-ms-win-core-processthreads-l1-1-0
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
GetCurrentThreadId
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-string-l1-1-0
CompareStringOrdinal
api-ms-win-core-synch-l1-1-0
InitializeSRWLock
api-ms-win-core-synch-l1-2-0
Sleep
api-ms-win-core-sysinfo-l1-1-0
GetTickCount
GetSystemTimeAsFileTime
api-ms-win-core-threadpool-l1-2-0
CloseThreadpoolWork
CreateThreadpoolWork
SubmitThreadpoolWork
api-ms-win-service-core-l1-1-0
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerExW
SetServiceStatus
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 972B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 141KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ