C:\Perforce\FRMain\code\build\win\results\Release\info\arh.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9c689d1735b8d54f141d1f0032c30f84f46e04967f59db3b7561bc4562cd32af_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9c689d1735b8d54f141d1f0032c30f84f46e04967f59db3b7561bc4562cd32af_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
9c689d1735b8d54f141d1f0032c30f84f46e04967f59db3b7561bc4562cd32af_NeikiAnalytics.exe
-
Size
1.3MB
-
MD5
d75e3598eb354fc657349c2d9fb5cfe0
-
SHA1
efd207b73a215f23f72ab3e176abbcff013d8515
-
SHA256
9c689d1735b8d54f141d1f0032c30f84f46e04967f59db3b7561bc4562cd32af
-
SHA512
65cf8f3f966860491a9ab7cac387f437e79377f25b62af109a29aa1fe58817a88288711b69419bd7143b375b3f40e37d7a93a23d463cd803f9b60cb58feb3367
-
SSDEEP
12288:TYmIjE7FxqTSgZG5GnWMBUKZGYaJ08vTZLfX+PdgdnW:R7FxVirnlBUKZ408vTZrX+lgdW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9c689d1735b8d54f141d1f0032c30f84f46e04967f59db3b7561bc4562cd32af_NeikiAnalytics.exe
Files
-
9c689d1735b8d54f141d1f0032c30f84f46e04967f59db3b7561bc4562cd32af_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
085b8a5d9e723b8ba9982a936ce1c779
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WideCharToMultiByte
CreateFileA
HeapAlloc
GetProcessHeap
HeapFree
CloseHandle
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
LocalFree
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WriteFile
SetFilePointer
WriteConsoleW
GetFileType
GetStdHandle
GetModuleFileNameW
GetLastError
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetStartupInfoA
Sleep
GetModuleHandleW
GetProcAddress
ExitProcess
LoadLibraryW
RaiseException
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
VirtualAlloc
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
LoadLibraryA
RtlUnwind
WriteConsoleA
GetConsoleOutputCP
SetStdHandle
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
msi
ord141
ord90
ord205
ord173
ord16
shlwapi
PathAppendW
PathRemoveFileSpecW
StrDupW
StrChrA
PathAppendA
advapi32
CryptAcquireContextW
CryptDestroyHash
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
CryptReleaseContext
CryptCreateHash
CryptHashData
CryptGetHashParam
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE