D:\builds\build-mmsource\windows-1.11\OUTPUT\core\metamod.2.doi\windows-x86\metamod.2.doi.pdb
Static task
static1
Behavioral task
behavioral1
Sample
98647b6277ea7bc004270d352a622d04252fdd00831f35733b36c961b4138794_NeikiAnalytics.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
98647b6277ea7bc004270d352a622d04252fdd00831f35733b36c961b4138794_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
98647b6277ea7bc004270d352a622d04252fdd00831f35733b36c961b4138794_NeikiAnalytics.exe
-
Size
228KB
-
MD5
6c463c221f041b26ff694407c06ee110
-
SHA1
e852cae1fd1cec5b21ba648364ee23e02a52b7c8
-
SHA256
98647b6277ea7bc004270d352a622d04252fdd00831f35733b36c961b4138794
-
SHA512
fc75f61edb1923f6a1297e116c35a264a50580b7559001abd6299733bb3df3b4fe7d6f13ccc2595e3577dcf7710af0027621603be288fa59886a0e4d3c5fb11c
-
SSDEEP
6144:DsJUwYnVniWe62ejo3CvFfq6G4Vv7/xeXClUMTz722yOjNo3V0QChalVs1mG9WBW:4JUwYnVnXt2ejo3CvFfq6G4Vv7/xeXCX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 98647b6277ea7bc004270d352a622d04252fdd00831f35733b36c961b4138794_NeikiAnalytics.exe
Files
-
98647b6277ea7bc004270d352a622d04252fdd00831f35733b36c961b4138794_NeikiAnalytics.exe.dll windows:5 windows x86 arch:x86
63096cd166228383497f2c317daec6f8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
FindClose
FindFirstFileA
FindNextFileA
GetLastError
FormatMessageA
VirtualQuery
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
VirtualProtect
GetSystemInfo
VirtualFree
IsBadReadPtr
VirtualAlloc
DecodePointer
WriteConsoleW
SetEndOfFile
ReadConsoleW
ReadFile
HeapReAlloc
HeapSize
GetStringTypeW
SetFilePointerEx
WideCharToMultiByte
MultiByteToWideChar
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RaiseException
InterlockedFlushSList
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetFullPathNameW
GetDriveTypeW
GetCurrentDirectoryW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapAlloc
HeapFree
LCMapStringW
GetStdHandle
GetFileType
CloseHandle
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
SetStdHandle
CreateFileW
GetFileSizeEx
tier0
_AssertValidWritePtr
_AssertValidStringPtr
MemFreeScratch
MemAllocScratch
?ConMsg@@YAXPBDZZ
Error
Warning
_AssertValidReadPtr
CommandLine
g_pMemAlloc
?DevMsg@@YAXPBDZZ
vstdlib
KeyValuesSystem
Exports
Exports
GetGameDllBridge
GetVspBridge
Sections
.text Size: 169KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ