TSWbPrxy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
42a914f678940dd71f5abee6298951475dac7c2a16eec264201e4263ae155f5f_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
42a914f678940dd71f5abee6298951475dac7c2a16eec264201e4263ae155f5f_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
42a914f678940dd71f5abee6298951475dac7c2a16eec264201e4263ae155f5f_NeikiAnalytics.exe
-
Size
72KB
-
MD5
1d171ec7bbb39dd398a81fa13d80e6f0
-
SHA1
dcb8c104b530ec7fdc247d893d376aa088c7bf88
-
SHA256
42a914f678940dd71f5abee6298951475dac7c2a16eec264201e4263ae155f5f
-
SHA512
96fc5db9c7f161a0f37fdf335736224e8cdc7f0cd484627d8f5f97d0689a5d4c8effbfddd66b7cb926c20a1f0d266dee6ff2078dee9751781cbb241226454ec9
-
SSDEEP
1536:YU61eGK9Fo6gGGhO2tyk5aEMk3bXAm/lVoqrXKuzIUyRIw9ZJMj:5Q6gdhO2tyk5aHk3DTN5K2nyWw9oj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 42a914f678940dd71f5abee6298951475dac7c2a16eec264201e4263ae155f5f_NeikiAnalytics.exe
Files
-
42a914f678940dd71f5abee6298951475dac7c2a16eec264201e4263ae155f5f_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
c39680aee693e799fbc6fb51f4525bcc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
TraceMessage
kernel32
GetSystemWow64DirectoryW
CompareStringW
GetLastError
GetSystemDirectoryW
CloseHandle
WaitForSingleObject
lstrlenW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
LoadLibraryW
GetProcAddress
GetModuleHandleW
lstrcmpiW
CreateProcessW
GetModuleFileNameW
Sleep
CreateThread
CreateEventW
GetCurrentThreadId
SetEvent
FreeLibrary
GetCurrentProcessId
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetCommandLineW
GetVersionExA
InterlockedExchange
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
RtlUnwind
OutputDebugStringA
GetStartupInfoW
InterlockedCompareExchange
MultiByteToWideChar
user32
CharUpperW
PostThreadMessageW
AllowSetForegroundWindow
CharNextW
UnregisterClassA
GetMessageW
TranslateMessage
DispatchMessageW
msvcrt
_controlfp
memcpy
_onexit
_lock
__dllonexit
_amsg_exit
realloc
_unlock
??1type_info@@UAE@XZ
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
?terminate@@YAXXZ
__set_app_type
_errno
__CxxFrameHandler
??2@YAPAXI@Z
??_U@YAPAXI@Z
_purecall
memset
_CxxThrowException
free
malloc
??_V@YAXPAX@Z
??3@YAXPAX@Z
__p__fmode
__p__commode
__setusermatherr
ole32
CoTaskMemFree
CoRegisterClassObject
CoRevokeClassObject
CoTaskMemRealloc
CoTaskMemAlloc
CoUninitialize
CoInitialize
CoCreateInstance
StringFromGUID2
oleaut32
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayCreate
SafeArrayUnlock
SafeArrayLock
LoadRegTypeLi
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
SysFreeString
SafeArrayDestroy
shlwapi
PathAppendW
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE