unsecapp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0e93c461bf7d60f4b80368d4f99189857d0602a61be0a78570bbf06d5b58e616_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0e93c461bf7d60f4b80368d4f99189857d0602a61be0a78570bbf06d5b58e616_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
0e93c461bf7d60f4b80368d4f99189857d0602a61be0a78570bbf06d5b58e616_NeikiAnalytics.exe
-
Size
25KB
-
MD5
7a1573689c2e7b7352dc2882acd091e0
-
SHA1
7bc584f7138b5d4f8b5b516ac1319407c6759c7b
-
SHA256
0e93c461bf7d60f4b80368d4f99189857d0602a61be0a78570bbf06d5b58e616
-
SHA512
b9447d3240a1ad1d684cf47c99006b111f2cadbe87f162c4399f26562be70a2d4895f3a5ba720d32779941b1e5c437f5f10bfc8fd474465bab97c459aa2325e4
-
SSDEEP
768:ibMr/y/RgqCahNPW38b0qHqvnH5Q8m27yfgoVgA1L:UMr6JhCahdW38b0qqvZkg2gC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e93c461bf7d60f4b80368d4f99189857d0602a61be0a78570bbf06d5b58e616_NeikiAnalytics.exe
Files
-
0e93c461bf7d60f4b80368d4f99189857d0602a61be0a78570bbf06d5b58e616_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
443edb17d35a0b28fba9d5e5ad84a9aa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
??3@YAXPAX@Z
?terminate@@YAXXZ
??2@YAPAXI@Z
_onexit
__dllonexit
_controlfp
??1type_info@@UAE@XZ
_except_handler3
__set_app_type
__CxxFrameHandler
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__initenv
exit
_cexit
_XcptFilter
_exit
_c_exit
_CxxThrowException
printf
wcsstr
_vsnwprintf
_purecall
advapi32
CreateServiceW
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
SetServiceStatus
OpenSCManagerW
DeleteService
OpenServiceW
RegSetValueExW
RegCloseKey
RegCreateKeyW
RegDeleteKeyW
RegOpenKeyW
IsValidSid
GetLengthSid
EqualSid
kernel32
ExitProcess
SetEvent
GetLastError
CreateEventW
GetModuleFileNameW
lstrlenW
GetCommandLineW
SetUnhandledExceptionFilter
EnterCriticalSection
DebugBreak
InitializeCriticalSectionAndSpinCount
LCMapStringW
LeaveCriticalSection
InterlockedIncrement
DeleteCriticalSection
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
wbemcomn
??0CNtSid@@QAE@PAX@Z
??0Registry@@QAE@PAGK@Z
?GetDWORDStr@Registry@@QAEHPAGPAK@Z
??1Registry@@QAE@XZ
??0CCritSec@@QAE@XZ
??1CCritSec@@QAE@XZ
?ErrorTrace@@YAHDPBDZZ
??0CNtSid@@QAE@W4SidType@0@@Z
??0CInCritSec@@QAE@PAU_RTL_CRITICAL_SECTION@@@Z
??8CNtSid@@QAEHAAV0@@Z
?GetTextSid@CNtSid@@QAEHPAGPAK@Z
??1CInCritSec@@QAE@XZ
??0CNtSid@@QAE@ABV0@@Z
??4CNtSid@@QAEAAV0@ABV0@@Z
??0CUnk@@QAE@PAVCLifeControl@@PAUIUnknown@@@Z
??1CUnk@@UAE@XZ
?QueryInterface@CUnk@@UAGJABU_GUID@@PAPAX@Z
?AddRef@CUnk@@UAGKXZ
?Release@CUnk@@UAGKXZ
?OnInitialize@CUnk@@UAEHXZ
?Initialize@CUnk@@UAEHXZ
??_7CUnkInternal@@6B@
??0CUnkInternal@@QAE@PAVCLifeControl@@@Z
??1CUnkInternal@@UAE@XZ
?QueryInterface@CUnkInternal@@UAGJABU_GUID@@PAPAX@Z
?InternalRelease@CUnkInternal@@QAEKXZ
?InternalQueryInterface@CUnkInternal@@QAEJABU_GUID@@PAPAX@Z
?AddRef@CUnkInternal@@UAGKXZ
?Release@CUnkInternal@@UAGKXZ
??1CNtSid@@QAE@XZ
ole32
CoImpersonateClient
CoRevertToSelf
CoInitialize
CoInitializeSecurity
CoRegisterClassObject
StringFromGUID2
CoRevokeClassObject
user32
SetTimer
DispatchMessageW
TranslateMessage
GetMessageW
PostThreadMessageW
PostQuitMessage
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1016B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nkh Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE