C:\CI\j\workspace\core\vray_max_build\build\MAX\2023\vrayspawner\vraystdspawner\bin\vraystdspawner.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9d0ce136ab2fa3d9522b6e3b7d8f66f7bbf578a41ee9b5ea902a936409fbe0a6_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
9d0ce136ab2fa3d9522b6e3b7d8f66f7bbf578a41ee9b5ea902a936409fbe0a6_NeikiAnalytics.exe
-
Size
1.5MB
-
MD5
40ea6c7d06c61ff719554a5bd279bce0
-
SHA1
76f5bfd222a654683361a98a88fabdac67e14ce4
-
SHA256
9d0ce136ab2fa3d9522b6e3b7d8f66f7bbf578a41ee9b5ea902a936409fbe0a6
-
SHA512
05248cf19fb7caef6d2fc96975128b9194d1788b97b911ff5ee1be8994d115a107720bca65ca130eb3a878bea0dfd4b55bcff083109bae1a225b81038817e171
-
SSDEEP
12288:l4qZAHdhhhh4MehhhhbpFhczJBL7MfNF2lOy8q//WxHD4mG0PF00ahiretvXdlgp:lLZAHmFGFBP8JUODHG0900ibGP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9d0ce136ab2fa3d9522b6e3b7d8f66f7bbf578a41ee9b5ea902a936409fbe0a6_NeikiAnalytics.exe
Files
-
9d0ce136ab2fa3d9522b6e3b7d8f66f7bbf578a41ee9b5ea902a936409fbe0a6_NeikiAnalytics.exe.exe windows:6 windows x64 arch:x64
7492ee84261c45a3af7df22482fd0f68
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
OpenProcessToken
OpenThreadToken
CopySid
GetLengthSid
GetTokenInformation
InitializeSecurityDescriptor
IsValidSid
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
DeregisterEventSource
RegisterEventSourceA
ReportEventA
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryInfoKeyW
RegQueryValueExA
RegSetValueExA
CloseServiceHandle
ControlService
CreateServiceA
DeleteService
OpenSCManagerA
OpenServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceCtrlDispatcherA
kernel32
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetCommandLineA
SetEnvironmentVariableA
CloseHandle
GetCurrentProcess
TerminateProcess
GetExitCodeProcess
GetCurrentThread
GetCurrentThreadId
ResumeThread
CreateProcessA
GetSystemInfo
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetProcAddress
LoadLibraryExA
LoadResource
SizeofResource
LocalFree
RaiseException
FormatMessageA
lstrcmpiA
FindResourceA
GetPrivateProfileStringA
MultiByteToWideChar
WideCharToMultiByte
IsDBCSLeadByte
WriteFile
GetTempPathW
GetCurrentProcessId
FindClose
FindFirstFileW
OutputDebugStringW
FormatMessageW
CreateFileW
QueryPerformanceCounter
FlushFileBuffers
GetFileSize
ReadFile
DecodePointer
SetProcessAffinityMask
SetEndOfFile
SetFilePointer
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
CreateEventW
ole32
CoTaskMemFree
CoTaskMemRealloc
CoInitialize
CoCreateInstance
StringFromGUID2
CoTaskMemAlloc
CoInitializeSecurity
CoRevokeClassObject
CoRegisterClassObject
CoUninitialize
oleaut32
SysStringLen
SysAllocString
LoadTypeLi
RegisterTypeLi
UnRegisterTypeLi
VarUI4FromStr
SysFreeString
shell32
Shell_NotifyIconA
user32
GetCursorPos
GetWindowRect
EndMenu
TrackPopupMenuEx
AppendMenuA
DestroyMenu
CreatePopupMenu
GetSystemMetrics
SetWindowLongPtrA
CharNextW
CharNextA
CreateDialogParamA
SetWindowPos
PostQuitMessage
PostThreadMessageA
PostMessageA
DispatchMessageA
TranslateMessage
GetMessageA
GetWindowLongPtrA
LoadIconA
DestroyIcon
SetTimer
EndDialog
iphlpapi
GetIpAddrTable
vcruntime140_1
__CxxFrameHandler4
vcruntime140
_purecall
__current_exception
__current_exception_context
__C_specific_handler
memcpy
_CxxThrowException
strchr
memset
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
realloc
_recalloc
malloc
api-ms-win-crt-runtime-l1-1-0
_set_app_type
_seh_filter_exe
_errno
_invalid_parameter_noinfo
_cexit
_register_thread_local_exe_atexit_callback
_c_exit
_register_onexit_function
_exit
exit
_crt_atexit
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
_get_narrow_winmain_command_line
_resetstkoflw
terminate
_initterm_e
_initterm
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-environment-l1-1-0
getenv
_putenv
api-ms-win-crt-string-l1-1-0
_stricmp
strcpy_s
strcat_s
strncpy
wcsncpy_s
api-ms-win-crt-multibyte-l1-1-0
_mbsnbcpy
_mbsstr
_mbsnbcpy_s
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vsprintf
__stdio_common_vsscanf
__p__commode
puts
_set_fmode
api-ms-win-crt-convert-l1-1-0
atoi
api-ms-win-crt-time-l1-1-0
_time64
_localtime64
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-math-l1-1-0
__setusermatherr
Sections
.text Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 135KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE