cleanmgr.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9300afafc839fcf0e5ecc002c6f97e6e4367f9f1dbe54426ada14b9914b87cbc_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9300afafc839fcf0e5ecc002c6f97e6e4367f9f1dbe54426ada14b9914b87cbc_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
9300afafc839fcf0e5ecc002c6f97e6e4367f9f1dbe54426ada14b9914b87cbc_NeikiAnalytics.exe
-
Size
86KB
-
MD5
8fd140ac7657bdd0eb36deafea96c990
-
SHA1
d77a9a92de20205a555ae04931341d46fdd79375
-
SHA256
9300afafc839fcf0e5ecc002c6f97e6e4367f9f1dbe54426ada14b9914b87cbc
-
SHA512
dd77da70a34bbb9aa3848166c0cf97d522a27a25dbd461c950a6ebf5dca5204003d039d91a899b051a84e0ef2241064f523bb970b410278a989d5b57659ed57e
-
SSDEEP
1536:T/E/8FZkgTGtnSe+L6ZtTqI1Rfkq4qv2WkqGpmcma:TckDkgTmSBCt71RfkqLmqGpR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9300afafc839fcf0e5ecc002c6f97e6e4367f9f1dbe54426ada14b9914b87cbc_NeikiAnalytics.exe
Files
-
9300afafc839fcf0e5ecc002c6f97e6e4367f9f1dbe54426ada14b9914b87cbc_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
a4df2eeb35e0b46d612e4033fdd4712b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
exit
__initenv
__getmainargs
__set_app_type
__p__fmode
__p__commode
_XcptFilter
_exit
_c_exit
_except_handler3
_controlfp
_cexit
_adjust_fdiv
__setusermatherr
_initterm
toupper
advapi32
RegSetValueExW
RegCloseKey
RegEnumKeyW
RegOpenKeyExW
RegOpenKeyW
RegQueryValueExW
kernel32
GetCommandLineW
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
LocalAlloc
LocalFree
lstrlenW
GetTickCount
CloseHandle
OpenProcess
Sleep
CreateProcessW
GetSystemTimeAsFileTime
GetDiskFreeSpaceExW
GetStartupInfoW
WaitForSingleObject
GetVolumeInformationW
GetLastError
CreateEventW
GetModuleHandleW
GetStartupInfoA
SetErrorMode
lstrcpyW
WideCharToMultiByte
MulDiv
LoadLibraryExW
GetSystemDirectoryW
FreeLibrary
GetProcAddress
LoadLibraryW
GetDiskFreeSpaceW
SetEvent
PulseEvent
CreateThread
GetDriveTypeW
FormatMessageW
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
gdi32
GetTextExtentPoint32W
SetBkMode
SetBkColor
SetTextColor
ExtTextOutW
user32
SetCursor
LoadCursorW
TranslateMessage
MsgWaitForMultipleObjects
GetWindowThreadProcessId
FindWindowW
LoadStringW
wsprintfW
ShowWindow
MessageBoxW
EnumWindows
RegisterClassW
DefDlgProcW
LoadIconW
SendMessageW
DispatchMessageW
SetDlgItemTextW
GetSystemMetrics
GetClientRect
WinHelpW
EnableWindow
SetWindowLongW
GetWindowLongW
SendDlgItemMessageW
IsDialogMessageW
DestroyWindow
CreateDialogParamW
PeekMessageW
DrawFocusRect
DrawIconEx
GetSysColor
SetFocus
EndDialog
DialogBoxParamW
GetWindowTextW
SetForegroundWindow
GetDlgItem
PostMessageW
ole32
CoInitialize
CLSIDFromString
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
oleaut32
VariantInit
VariantClear
shlwapi
StrCpyW
SHDeleteKeyW
ord346
StrCpyNW
StrStrIW
StrCmpW
StrFormatKBSizeW
StrToIntW
comctl32
ImageList_Create
ImageList_ReplaceIcon
ord17
CreatePropertySheetPageW
PropertySheetW
shell32
ShellExecuteW
ord680
ExtractIconExW
SHGetFileInfoW
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 63KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE