IMEGEN.pdb
Static task
static1
Behavioral task
behavioral1
Sample
97b4bb0ff8466eeb299fbca880d154f1b0bc0bb3307f694028921f71092329c8_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
97b4bb0ff8466eeb299fbca880d154f1b0bc0bb3307f694028921f71092329c8_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
97b4bb0ff8466eeb299fbca880d154f1b0bc0bb3307f694028921f71092329c8_NeikiAnalytics.exe
-
Size
154KB
-
MD5
2b928023be265226e6c0d81a6f498730
-
SHA1
5978678941b0035fe10491cb2f5de89b0e00b1a8
-
SHA256
97b4bb0ff8466eeb299fbca880d154f1b0bc0bb3307f694028921f71092329c8
-
SHA512
37850cc475e1f205f01ba4172979ed734538dc1f09e4782ca9efdb643fbc7e485254fa96dd6d2659047b93cf23c1b3158b5e900ac7a2164baa6d81347ae7af80
-
SSDEEP
3072:Gpk2kruj5jLfVSOvwKtK/0zbIy47OwIqtEyr8Q5z9CA4XubEip/LY34:IkT69j7VSO5+aJEtEywYhmKJdp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 97b4bb0ff8466eeb299fbca880d154f1b0bc0bb3307f694028921f71092329c8_NeikiAnalytics.exe
Files
-
97b4bb0ff8466eeb299fbca880d154f1b0bc0bb3307f694028921f71092329c8_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
e6bc2a014df7cdab9105074dc273a28f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
GetSaveFileNameW
GetOpenFileNameW
GetFileTitleW
imm32
ImmInstallIMEW
user32
GetFocus
LoadIconW
RegisterClassW
DefWindowProcW
GetWindowLongW
GetClientRect
BeginPaint
GetSysColor
EndPaint
LoadCursorW
SetCursor
InvalidateRect
MessageBoxW
wsprintfW
MessageBeep
DialogBoxParamW
PostMessageW
GetWindow
LoadStringW
CheckDlgButton
EndDialog
SetFocus
SetWindowLongW
CallWindowProcW
EnableWindow
GetDlgItem
GetDlgItemTextW
GetDlgItemInt
IsDlgButtonChecked
SendDlgItemMessageW
SetDlgItemTextW
SetDlgItemInt
CheckRadioButton
GetParent
SendMessageW
kernel32
VirtualFree
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
GetModuleHandleA
ExitProcess
HeapAlloc
HeapFree
GetFileAttributesA
GetFileAttributesW
GetVersionExA
GetCommandLineA
GetStartupInfoA
LoadLibraryA
lstrlenW
GlobalUnlock
GlobalLock
CopyFileW
GetSystemDirectoryW
lstrcatW
lstrcpyW
GlobalFree
GlobalAlloc
GetWindowsDirectoryW
lstrcmpiW
CreateThread
TerminateThread
GetFileInformationByHandle
CloseHandle
SuspendThread
WriteFile
ReadFile
VirtualProtect
MoveFileW
DeleteFileW
LocalFree
LocalUnlock
LocalLock
LocalAlloc
CreateFileW
GlobalReAlloc
GetLastError
SetEndOfFile
WideCharToMultiByte
LockResource
LoadResource
FindResourceW
_lclose
UpdateResourceW
_lread
_llseek
GetFileSize
OpenFile
EndUpdateResourceW
BeginUpdateResourceW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetSystemInfo
VirtualQuery
MultiByteToWideChar
LCMapStringA
LCMapStringW
VirtualAlloc
GetACP
GetOEMCP
GetCPInfo
RtlUnwind
InterlockedExchange
GetLocaleInfoA
SetFilePointer
HeapReAlloc
GetStringTypeA
GetStringTypeW
ResumeThread
GetProcAddress
gdi32
CreateSolidBrush
CreatePen
SelectObject
DeleteObject
Rectangle
advapi32
RegOpenKeyExA
RegQueryValueExA
RegQueryValueExW
RegEnumValueW
RegCreateKeyW
RegOpenKeyW
RegCloseKey
comctl32
PropertySheetW
Sections
.text Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ndata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE