SyncHost.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ba06f0baed2c8945e7cf124b41ecf74a5758c8f68d9f1b4bed98b74ffd707adc_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ba06f0baed2c8945e7cf124b41ecf74a5758c8f68d9f1b4bed98b74ffd707adc_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
ba06f0baed2c8945e7cf124b41ecf74a5758c8f68d9f1b4bed98b74ffd707adc_NeikiAnalytics.exe
-
Size
65KB
-
MD5
a3846ffa6ecafa32b0c451aa51538200
-
SHA1
f9a6754339240488abc17cfc0a2d5c513b5e7c74
-
SHA256
ba06f0baed2c8945e7cf124b41ecf74a5758c8f68d9f1b4bed98b74ffd707adc
-
SHA512
d6ba4644b7989fa9e193c6007445151ccb97bdaa47de222b192c6dc98a8f44bb7d72b70d6447c9abd6b2666b9d0a1f58e750bb1b687aa8396840c2e52941eb9c
-
SSDEEP
1536:sMi8nqF4cNNRciJMDtzNOJ3WCGmLXkGbtjwpouN:VdI4WciJgtzNJwLXVhjYN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ba06f0baed2c8945e7cf124b41ecf74a5758c8f68d9f1b4bed98b74ffd707adc_NeikiAnalytics.exe
Files
-
ba06f0baed2c8945e7cf124b41ecf74a5758c8f68d9f1b4bed98b74ffd707adc_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
16660a94f8a6a5052fe5334a712f36be
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryInfoKeyW
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
RegisterTraceGuidsW
UnregisterTraceGuids
RegEnumKeyExW
TraceMessage
kernel32
lstrlenW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetLastError
LoadLibraryW
GetProcAddress
GetModuleHandleW
lstrcmpiW
GetModuleFileNameW
Sleep
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
SetEvent
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetCommandLineW
DebugBreak
FormatMessageW
InterlockedExchange
GetVersionExA
OutputDebugStringA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
user32
UnregisterClassA
PostThreadMessageW
TranslateMessage
DispatchMessageW
CharUpperW
CharNextW
GetMessageW
msvcrt
malloc
free
memcpy_s
wcscpy_s
wcsncpy_s
wcscat_s
??_V@YAXPAX@Z
??_U@YAPAXI@Z
memset
??3@YAXPAX@Z
_controlfp
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
_errno
realloc
_except_handler4_common
__p__commode
__set_app_type
__p__fmode
_initterm
__setusermatherr
_amsg_exit
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
??2@YAPAXI@Z
_purecall
ole32
CoTaskMemAlloc
CoTaskMemRealloc
CoRevokeClassObject
CoRegisterClassObject
PropVariantClear
CoCreateInstance
StringFromGUID2
CoUninitialize
CoInitializeEx
CoTaskMemFree
oleaut32
GetErrorInfo
VarUI4FromStr
RegisterTypeLi
SysStringLen
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
shlwapi
SHStrDupW
propsys
PropVariantToGUID
PropVariantToUInt32
winsync
ord1
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE