f:\外壳10.13\tnet2\release\Dotfuscated\3dnet.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9a8aac3dc546cce4f52dcecdb7764ab4af015385756333fb95ff2dbbde14c3d9_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
9a8aac3dc546cce4f52dcecdb7764ab4af015385756333fb95ff2dbbde14c3d9_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
9a8aac3dc546cce4f52dcecdb7764ab4af015385756333fb95ff2dbbde14c3d9_NeikiAnalytics.exe
-
Size
240KB
-
MD5
09d65ce72774b80ecfadc8d53e717470
-
SHA1
bebe7f3d652471e0a688a634faabdf63bceb4551
-
SHA256
9a8aac3dc546cce4f52dcecdb7764ab4af015385756333fb95ff2dbbde14c3d9
-
SHA512
194cf95fcc3767c9bc97a4c7c46ed1596b2f3fcea9eb06c898cf2aca454b1325e4da2a65a5be9b9ef15e3305d64ba36733f69d338edfc4904c16032d7a13edf8
-
SSDEEP
6144:cQwfnYNezlmQCn9ezsbCM0yQrRcxAXa8oyx1:cQwfYAZmQCn9e4bCM0yQrRcxAVx1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9a8aac3dc546cce4f52dcecdb7764ab4af015385756333fb95ff2dbbde14c3d9_NeikiAnalytics.exe
Files
-
9a8aac3dc546cce4f52dcecdb7764ab4af015385756333fb95ff2dbbde14c3d9_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
99749dd649810cf4105f4973c8237e5e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcr80
free
calloc
malloc
realloc
_strnicmp
__FrameUnwindFilter
__p__fmode
__p__commode
_configthreadlocale
__wgetmainargs
_XcptFilter
__set_app_type
_amsg_exit
_cexit
??2@YAPAXI@Z
_crt_debugger_hook
_except_handler4_common
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
_encode_pointer
kernel32
lstrcpyA
Sleep
CreateThread
GetModuleHandleA
GetLocalTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentProcess
TerminateProcess
ReleaseSemaphore
CreateFileA
GetLastError
lstrlenA
CreateSemaphoreA
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
GetCurrentProcessId
OpenProcess
CloseHandle
GetModuleHandleW
FindResourceW
LoadResource
LockResource
WaitForSingleObject
SizeofResource
msvcm80
?DoDllLanguageSupportValidation@<CrtImplementationDetails>@@YAXXZ
?RegisterModuleUninitializer@<CrtImplementationDetails>@@YAXP$AAVEventHandler@System@@@Z
?ThrowModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVString@System@@@Z
?ThrowNestedModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVException@System@@0@Z
?DoCallBackInDefaultDomain@<CrtImplementationDetails>@@YAXP6GJPAX@Z0@Z
__setusermatherr_m
?ThrowModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVString@System@@P$AAVException@3@@Z
setupapi
SetupDiGetDeviceInterfaceDetailA
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsA
SetupDiDestroyDeviceInfoList
hid
HidP_GetScaledUsageValue
HidD_GetFeature
HidD_SetFeature
HidD_GetHidGuid
HidP_GetUsageValue
HidD_GetAttributes
HidD_GetPreparsedData
HidP_GetUsages
HidP_SetUsageValue
HidP_SetUsages
HidD_FreePreparsedData
HidP_GetCaps
advapi32
RegOpenKeyExA
RegCloseKey
RegEnumKeyExA
user32
wsprintfA
GetSystemMetrics
MessageBoxA
mscoree
_CorExeMain
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ