E:\CPython\cpython35\lib\distutils\command\wininst-14.0.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a5240d48f31767da15a4327dfca7ac1b0239659a3825db0c5063fa196c1bbbcf_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a5240d48f31767da15a4327dfca7ac1b0239659a3825db0c5063fa196c1bbbcf_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
a5240d48f31767da15a4327dfca7ac1b0239659a3825db0c5063fa196c1bbbcf_NeikiAnalytics.exe
-
Size
752KB
-
MD5
c90e07c7d81d3128b95bbf4805e1b9f0
-
SHA1
ee01a75a1c026a01138fae1460b74292f60bfa9c
-
SHA256
a5240d48f31767da15a4327dfca7ac1b0239659a3825db0c5063fa196c1bbbcf
-
SHA512
e9a4a9761e8b14630a7ed39a8aa0d4283921dd1299f8b1c98003aa5360dfa9c45195eac58ea7106c138a1ac75d0e57a8f7a6757c19c50ab65448b0aac5aec2d6
-
SSDEEP
12288:PJwmUfKBk1qxF9LWvWzYl0smh8K1u4Tsgm/GIpFsw/uw9DuY3pQWF7urAHo743Nx:hwal3zYlXmh8K1fTfLIA7wdZBVlH443s
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a5240d48f31767da15a4327dfca7ac1b0239659a3825db0c5063fa196c1bbbcf_NeikiAnalytics.exe
Files
-
a5240d48f31767da15a4327dfca7ac1b0239659a3825db0c5063fa196c1bbbcf_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
4a2bd785bc3baf187c17a5e22d660299
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
CreatePropertySheetPageA
PropertySheetA
kernel32
SetThreadPriority
SetFilePointer
ResumeThread
GetModuleHandleA
MultiByteToWideChar
GetTempPathA
GetCurrentThread
LoadLibraryA
DeleteFileA
SetStdHandle
GetProcAddress
LocalFree
GetFileSize
RemoveDirectoryA
FreeLibrary
CreateProcessA
FormatMessageA
GetTempFileNameA
GetPrivateProfileIntA
GetPrivateProfileStringA
DecodePointer
CreateDirectoryA
GetModuleFileNameW
HeapSize
WriteConsoleW
FlushFileBuffers
SetFilePointerEx
SetEndOfFile
GetFileAttributesExW
SetConsoleCtrlHandler
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileW
FindNextFileA
FindFirstFileExW
FindFirstFileExA
FindClose
CreateThread
WaitForSingleObjectEx
OutputDebugStringW
OutputDebugStringA
GetFullPathNameA
GetFullPathNameW
LoadLibraryExA
GetStdHandle
GetCurrentProcess
SetPriorityClass
GetModuleFileNameA
ReadFile
MapViewOfFile
GetTempPathW
DosDateTimeToFileTime
CreateFileMappingA
CloseHandle
CreateFileA
GetFileAttributesA
GetLastError
UnmapViewOfFile
lstrlenA
SetFileTime
SetLastError
EncodePointer
GetCurrentDirectoryW
RaiseException
SetCurrentDirectoryW
GetTimeZoneInformation
GetStringTypeW
GetConsoleCP
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
WideCharToMultiByte
GetCommandLineA
GetCommandLineW
CreateFileW
GetDriveTypeW
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
WriteFile
ExitProcess
GetModuleHandleExW
GetACP
GetConsoleMode
ReadConsoleW
HeapFree
HeapAlloc
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetEnvironmentVariableA
SetEnvironmentVariableW
HeapReAlloc
user32
ReleaseDC
BeginPaint
EndPaint
DispatchMessageA
GetWindowRect
GetFocus
LoadCursorA
GetDC
PostMessageA
GetSystemMetrics
wsprintfA
ShowWindow
MessageBoxA
MoveWindow
RegisterClassA
DefWindowProcA
CreateWindowExA
TranslateMessage
SendDlgItemMessageA
SetDlgItemTextA
SendMessageA
SetCursor
GetDlgItem
PeekMessageA
GetParent
UpdateWindow
gdi32
SelectObject
CreateDIBitmap
SetTextColor
TextOutA
SetBkMode
DeleteObject
CreateSolidBrush
CreateFontA
advapi32
RegDeleteValueA
RegOpenKeyExA
RegCloseKey
RegDeleteKeyA
RegQueryValueExA
RegCreateKeyExA
RegQueryValueA
RegSetValueExA
RegEnumKeyExA
shell32
ShellExecuteA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
Sections
.text Size: 359KB - Virtual size: 358KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 372B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 317KB - Virtual size: 320KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ