mscorsvw.pdb
Static task
static1
Behavioral task
behavioral1
Sample
141c6a12f1378e11d7f8459048433e21a0ceb630d547ee29f3d5b039f5da8a33_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
141c6a12f1378e11d7f8459048433e21a0ceb630d547ee29f3d5b039f5da8a33_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
141c6a12f1378e11d7f8459048433e21a0ceb630d547ee29f3d5b039f5da8a33_NeikiAnalytics.exe
-
Size
625KB
-
MD5
045f94d112b41eba47104f28ab869c70
-
SHA1
d464b19684ff6d14a5e22e12cabeb953e4615559
-
SHA256
141c6a12f1378e11d7f8459048433e21a0ceb630d547ee29f3d5b039f5da8a33
-
SHA512
365b97dccb9775d25b14bfe5fdf4593e969791bee3502a67029b7509c5b54ac06d25835b34e54c4b5ada1cfec016cf352b1e47aaff6dd9dee03fcb0a132ea790
-
SSDEEP
12288:72LFCrNDFKYmKIiirRGW2phzrvXuayM1J3AAlrAf0d83QC0OXxcpGHMki:qL8NDFKYmKOF0zr31JwAlcR3QC0OXxcm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 141c6a12f1378e11d7f8459048433e21a0ceb630d547ee29f3d5b039f5da8a33_NeikiAnalytics.exe
Files
-
141c6a12f1378e11d7f8459048433e21a0ceb630d547ee29f3d5b039f5da8a33_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
a14fe147cbb35ac7afa52e2cceed81b7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
GetRealProcAddress
GetRequestedRuntimeInfo
msvcr80
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
_except_handler4_common
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
free
malloc
wcstoul
wcscat_s
towupper
_vsnprintf
_vsnwprintf_s
_vsnprintf_s
_errno
wcsncpy_s
wcscpy_s
strcpy_s
_snwprintf_s
memmove
memset
strchr
_CxxThrowException
__CxxFrameHandler3
_wcsicmp
_purecall
memcpy
advapi32
RegQueryValueExW
RegCreateKeyExW
RegCreateKeyExA
RegSetValueExW
RegSetValueExA
RegDeleteKeyW
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyExW
RegOpenKeyExA
RegCloseKey
kernel32
GetEnvironmentVariableA
GetEnvironmentVariableW
GetCurrentProcessId
LocalAlloc
FormatMessageA
FormatMessageW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
ResetEvent
ReleaseSemaphore
TlsSetValue
TlsAlloc
TlsFree
HeapAlloc
GetProcessHeap
HeapFree
WaitForSingleObjectEx
ReleaseMutex
SleepEx
VirtualAlloc
VirtualFree
VirtualQuery
VirtualProtect
HeapCreate
HeapDestroy
HeapValidate
InterlockedExchange
Sleep
GetStartupInfoA
SetUnhandledExceptionFilter
GetTickCount
UnhandledExceptionFilter
GetProcAddress
InterlockedIncrement
IsDebuggerPresent
InterlockedDecrement
TerminateProcess
GetCurrentProcess
WaitForMultipleObjects
CreateThread
OpenProcess
SetEvent
DebugBreak
TlsGetValue
InterlockedCompareExchange
GetLastError
SetLastError
GetModuleHandleA
FreeLibrary
CloseHandle
RaiseException
LocalFree
MultiByteToWideChar
GetCPInfo
GetACP
GetCurrentThreadId
QueryPerformanceCounter
GetSystemTimeAsFileTime
lstrlenW
GetVersionExA
GetModuleHandleW
GetCommandLineW
WideCharToMultiByte
LoadLibraryExA
LoadLibraryExW
GetModuleFileNameA
GetModuleFileNameW
CreateSemaphoreA
CreateSemaphoreW
CreateMutexA
CreateMutexW
CreateEventA
CreateEventW
OpenEventA
OpenEventW
user32
PeekMessageA
PeekMessageW
DispatchMessageA
DispatchMessageW
MessageBoxA
MessageBoxW
LoadStringA
LoadStringW
MsgWaitForMultipleObjects
ole32
CoRevokeClassObject
CoAddRefServerProcess
CoUninitialize
CoInitializeEx
CoRegisterClassObject
CoReleaseServerProcess
oleaut32
SysStringLen
SetErrorInfo
Sections
.text Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE