C:\builds\soyuz.rel3.12\development\build\release\x64\umloader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0e22d70b4c2bc64d2026ffc445d791f7f29085d77d16668d1feebb94d1791524_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0e22d70b4c2bc64d2026ffc445d791f7f29085d77d16668d1feebb94d1791524_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
0e22d70b4c2bc64d2026ffc445d791f7f29085d77d16668d1feebb94d1791524_NeikiAnalytics.exe
-
Size
664KB
-
MD5
ed19772fb164a20c540fc8099c738980
-
SHA1
8d6a7045c1358032d34f5cc3dfbf8b99ba310963
-
SHA256
0e22d70b4c2bc64d2026ffc445d791f7f29085d77d16668d1feebb94d1791524
-
SHA512
39eefcf0c93130e955bcdde784981670dc2bcc624c8d7c807ac8b8df93d54a4ba1e7217110d6b1ceaf3b4ec86a4ec5d19ce299b51cfaaad802fb5c241c8c239a
-
SSDEEP
12288:NFjGEInuPN3WZTqpxy0jEW0ZiwloiHuOIztOPHm6cr:OEInBUpbJQBlD/IztOO6A
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e22d70b4c2bc64d2026ffc445d791f7f29085d77d16668d1feebb94d1791524_NeikiAnalytics.exe
Files
-
0e22d70b4c2bc64d2026ffc445d791f7f29085d77d16668d1feebb94d1791524_NeikiAnalytics.exe.exe windows:6 windows x64 arch:x64
9759afc85491633ea754af80763d2351
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
DecodePointer
CloseHandle
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionEx
GetHandleInformation
GetProcessId
ExpandEnvironmentStringsA
GetModuleHandleW
GetProcAddress
lstrcmpiW
RaiseException
WideCharToMultiByte
LocalFree
GetCurrentProcess
GetFileAttributesA
GetModuleFileNameA
GetLastError
GetProcessHeap
DeleteCriticalSection
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
CreateFileW
GetCurrentProcessId
GetCurrentThreadId
OpenProcess
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
FreeLibrary
LoadLibraryExW
WriteProcessMemory
SetLastError
TerminateProcess
WaitForSingleObject
MultiByteToWideChar
VirtualProtectEx
VirtualAllocEx
ExitProcess
ReadProcessMemory
VirtualQueryEx
VirtualProtect
VirtualFree
VirtualAlloc
GetCurrentThread
VirtualQuery
LoadLibraryExA
GetModuleFileNameW
CreateSemaphoreW
ReleaseSemaphore
GetLocalTime
WriteFile
GetFileSize
SetFilePointer
OutputDebugStringW
FindFirstFileW
FindNextFileW
DeleteFileW
FindClose
GetFileTime
OutputDebugStringA
CreateFileA
ResetEvent
CreateNamedPipeA
WaitNamedPipeA
WaitNamedPipeW
DebugBreak
ReadFile
FlushFileBuffers
GetVersion
CancelIo
DisconnectNamedPipe
ConnectNamedPipe
SetNamedPipeHandleState
GetSystemInfo
FormatMessageW
RtlPcToFileHeader
EncodePointer
TryEnterCriticalSection
GetStringTypeW
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
QueryPerformanceFrequency
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
SetEvent
WaitForSingleObjectEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
GetVersionExW
DuplicateHandle
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
CreateTimerQueue
LoadLibraryW
RtlUnwindEx
GetTimeZoneInformation
GetModuleHandleExW
GetStdHandle
GetFileType
GetDateFormatW
GetTimeFormatW
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
ConvertStringSecurityDescriptorToSecurityDescriptorW
OpenProcessToken
rpcrt4
NdrServerCall2
RpcBindingVectorFree
RpcEpUnregister
RpcServerUnregisterIfEx
RpcMgmtWaitServerListen
RpcServerListen
RpcEpRegisterW
RpcServerInqBindings
RpcServerRegisterAuthInfoW
RpcServerInqDefaultPrincNameW
RpcServerRegisterIfEx
RpcServerUseProtseqEpW
RpcBindingInqAuthClientW
RpcStringFreeW
RpcMgmtStopServerListening
RpcGetAuthorizationContextForClient
RpcFreeAuthorizationContext
shell32
CommandLineToArgvW
Sections
.text Size: 418KB - Virtual size: 417KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 167KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ