C:\build\work\eca3d12b\wix3\build\ship\x86\SfxCA.pdb
Static task
static1
Behavioral task
behavioral1
Sample
72a340bba015f6a5c79e9a397d7763f81edc33fe468c38faaaa2f46509741c02_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
72a340bba015f6a5c79e9a397d7763f81edc33fe468c38faaaa2f46509741c02_NeikiAnalytics.dll
Resource
win10v2004-20240611-en
General
-
Target
72a340bba015f6a5c79e9a397d7763f81edc33fe468c38faaaa2f46509741c02_NeikiAnalytics.exe
-
Size
238KB
-
MD5
11ea7a989110065aa6325452f31f8610
-
SHA1
91ff0c4f11b165eba73208a287888b7e4d83d56f
-
SHA256
72a340bba015f6a5c79e9a397d7763f81edc33fe468c38faaaa2f46509741c02
-
SHA512
a7ddb26829502a2473c7059c02816957b5228322cc474754e9a4502b90cf4f5a004f2b217912fbba50ef56cfa98467425274f07bc09343f770a4d194dd56606c
-
SSDEEP
3072:rqtCogTMy+gR53kRYhvHcbwbehirdJY2y3MoTmonpjVFXVsPNF24:rqtVy+WFDhxk2yLmofFgG4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 72a340bba015f6a5c79e9a397d7763f81edc33fe468c38faaaa2f46509741c02_NeikiAnalytics.exe
Files
-
72a340bba015f6a5c79e9a397d7763f81edc33fe468c38faaaa2f46509741c02_NeikiAnalytics.exe.dll windows:5 windows x86 arch:x86
c2aac1b2b9fa36fbea7cd3d2b4516228
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msi
ord48
ord142
ord147
ord80
ord76
ord62
ord140
ord221
ord54
ord135
ord51
ord207
ord139
ord58
ord47
ord103
ord133
ord34
ord171
ord143
ord64
ord63
ord74
ord145
ord49
ord167
ord120
ord123
ord115
ord118
ord116
ord125
ord121
ord114
ord119
ord17
ord150
ord78
ord165
ord26
ord166
ord163
ord160
ord159
ord162
ord32
ord8
cabinet
ord22
ord21
ord20
ord23
shlwapi
PathFileExistsW
oleaut32
VariantInit
SafeArrayCreateVector
SafeArrayPutElement
SafeArrayDestroy
SysFreeString
SysAllocString
kernel32
HeapReAlloc
HeapSize
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetACP
GetStringTypeW
WriteConsoleW
GetStdHandle
SetEndOfFile
SetStdHandle
HeapAlloc
HeapFree
GetModuleFileNameA
GetModuleHandleExW
ExitProcess
GetConsoleCP
WideCharToMultiByte
ReadConsoleW
GetConsoleMode
SetFilePointerEx
GetFileType
FlushFileBuffers
LCMapStringW
CreateNamedPipeW
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
FreeLibrary
GetProcAddress
GetLastError
LoadLibraryW
CreateDirectoryW
MultiByteToWideChar
GetExitCodeProcess
CreateThread
GetOverlappedResult
SetEvent
ResetEvent
WaitForSingleObject
WaitForMultipleObjects
WriteFile
ReadFile
CloseHandle
GetTickCount
ConnectNamedPipe
DisconnectNamedPipe
CreateEventW
GetModuleFileNameW
CreateProcessW
GetSystemDirectoryW
CreateFileW
DecodePointer
WaitNamedPipeW
CancelIo
FindClose
GetTempPathW
RemoveDirectoryW
GetFileAttributesW
DeleteFileW
FindFirstFileW
FindNextFileW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RaiseException
InterlockedFlushSList
RtlUnwind
SetLastError
Exports
Exports
RemoveShareConfig
zzzEmbeddedUIHandler
zzzInitializeEmbeddedUI
zzzShutdownEmbeddedUI
zzzzInvokeManagedCustomActionOutOfProcW
Sections
.text Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ