C:\yufapo_hevuhalehu11\gomo29-kotozagagadobifa68\zucu.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a17aa9a0d16b3007eda7ea1b49990b5c61eaed24f94f72cc9a76090b3e249974_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a17aa9a0d16b3007eda7ea1b49990b5c61eaed24f94f72cc9a76090b3e249974_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
a17aa9a0d16b3007eda7ea1b49990b5c61eaed24f94f72cc9a76090b3e249974_NeikiAnalytics.exe
-
Size
331KB
-
MD5
a2df5d3acddb5c15f93272de23e64330
-
SHA1
709a580532db547fd981d772c34659d516c5b126
-
SHA256
a17aa9a0d16b3007eda7ea1b49990b5c61eaed24f94f72cc9a76090b3e249974
-
SHA512
fe00f1036f9c3e847bdbf484a2718c54d16b2d43a66705ef49d45f6420f5bca2d99cc1052820c200ed165879f15891bf3c36ec2fd5d2171d5fa078a9dbc17b1a
-
SSDEEP
6144:lTlHuWweToD56y5QFmdg5vfbQRl5h58qezROh7UDPR:lrweq56joKM/WqwAmPR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a17aa9a0d16b3007eda7ea1b49990b5c61eaed24f94f72cc9a76090b3e249974_NeikiAnalytics.exe
Files
-
a17aa9a0d16b3007eda7ea1b49990b5c61eaed24f94f72cc9a76090b3e249974_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
7cc0ae7f1191d356a018b6b04e615882
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineW
FindResourceA
TryEnterCriticalSection
UnmapViewOfFile
GetDriveTypeW
GetDefaultCommConfigW
WaitNamedPipeA
SetEnvironmentVariableW
WaitForSingleObject
SetTapeParameters
MoveFileWithProgressA
GetModuleHandleW
ExpandEnvironmentStringsA
EnumTimeFormatsA
EnumTimeFormatsW
GlobalAlloc
LoadLibraryW
Sleep
FormatMessageW
IsProcessorFeaturePresent
ReplaceFileW
GetSystemDirectoryA
GetStringTypeExA
GetLastError
DefineDosDeviceW
HeapUnlock
GetFirmwareEnvironmentVariableW
GetVolumePathNamesForVolumeNameA
FindFirstVolumeMountPointA
VirtualProtect
_lopen
EnumSystemLocalesW
CreateFileW
GetStringTypeW
GetUserDefaultLCID
IsValidLocale
HeapAlloc
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
RaiseException
RtlUnwind
IsDebuggerPresent
GetStdHandle
WriteFile
GetModuleFileNameW
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
FlushFileBuffers
GetConsoleCP
GetConsoleMode
DeleteCriticalSection
FatalAppExitA
HeapSize
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetTickCount
CreateSemaphoreW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCurrentThread
GetCurrentThreadId
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetFilePointerEx
OutputDebugStringW
SetStdHandle
WriteConsoleW
HeapReAlloc
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
CloseHandle
user32
GetQueueStatus
GetMessageTime
GetScrollBarInfo
Sections
.text Size: 159KB - Virtual size: 159KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 41KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE