WinMDIDL.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0b8d328e22da46724d91f2a71f0b00b028720574d56f64d9c614b95248321361_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
0b8d328e22da46724d91f2a71f0b00b028720574d56f64d9c614b95248321361_NeikiAnalytics.exe
-
Size
1.6MB
-
MD5
4f437000e64b5513fb1ec160af23e880
-
SHA1
5ac023ffde1038a0be269a232508d50279cad52b
-
SHA256
0b8d328e22da46724d91f2a71f0b00b028720574d56f64d9c614b95248321361
-
SHA512
1921d2b714cad4e86a08de27ec5e57716c0970986c11fc6f8c10069cef0846f2df0b74350ad88f8ccc241fa90ae46ad65df400ab3ad39a9778a965d63baf1bcb
-
SSDEEP
24576:4E4RQXM2mAN/i328ab4F+rM/aXq6bJfBUam6:cRQc2mk/i3da1YS6ozB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b8d328e22da46724d91f2a71f0b00b028720574d56f64d9c614b95248321361_NeikiAnalytics.exe
Files
-
0b8d328e22da46724d91f2a71f0b00b028720574d56f64d9c614b95248321361_NeikiAnalytics.exe.exe windows:10 windows x64 arch:x64
8c809da55eb0024791f2cf839759be1b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
SizeofResource
FindFirstFileExW
FindNextFileW
FindClose
MultiByteToWideChar
GetLastError
LockResource
FindResourceExW
LoadResource
DebugBreak
QueryPerformanceFrequency
GetProcAddress
FreeLibrary
QueryPerformanceCounter
LoadLibraryExW
RtlLookupFunctionEntry
RtlCaptureContext
CompareStringEx
LCMapStringEx
GetModuleHandleW
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
DecodePointer
GetCurrentProcessId
EncodePointer
InitializeCriticalSectionEx
GetStringTypeW
InitOnceExecuteOnce
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
RaiseException
DeleteCriticalSection
InitializeCriticalSection
HeapDestroy
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
RtlVirtualUnwind
api-ms-win-crt-string-l1-1-0
memset
wcsnlen
wcscmp
api-ms-win-crt-locale-l1-1-0
_lock_locales
_unlock_locales
api-ms-win-crt-runtime-l1-1-0
_c_exit
_initterm_e
_initterm
_register_thread_local_exe_atexit_callback
api-ms-win-crt-private-l1-1-0
_o___stdio_common_vfwprintf
_o___stdio_common_vswprintf
_o___stdio_common_vswprintf_s
_o__callnewh
_o__calloc_base
_o__cexit
_o__configthreadlocale
_o__configure_wide_argv
_o__crt_atexit
_o__errno
_o__exit
_o__free_base
_o__get_initial_wide_environment
_o__initialize_onexit_table
_o__initialize_wide_environment
_o__invalid_parameter_noinfo
_o__invalid_parameter_noinfo_noreturn
_o__malloc_base
_o__purecall
_o__register_onexit_function
_o__seh_filter_exe
_o__set_app_type
_o__set_fmode
_o__set_new_mode
_o__ultow_s
_o__wcsdup
_o__wcslwr_s
_o__wfopen_s
_o__wmkdir
_o_abort
_o_exit
_o_fclose
_o_feof
_o_fgetws
_o_fputws
_o_free
_o_malloc
_o_realloc
_o_setlocale
_o_terminate
_o_wcscpy_s
_o_wcstol
_o_wmemcpy_s
__C_specific_handler
__uncaught_exception
_CxxThrowException
_o___p__commode
_o___stdio_common_vfprintf
_o___std_exception_destroy
_o___std_exception_copy
_o___pctype_func
_o___p___wargv
_o___p___argc
_o___acrt_iob_func
_o____mb_cur_max_func
_o____lc_locale_name_func
_o____lc_collate_cp_func
_o____lc_codepage_func
strchr
wcsrchr
wcsstr
wcschr
__CxxFrameHandler3
memcmp
memcpy
memmove
ole32
CoUninitialize
CoInitialize
CoCreateInstance
user32
UnregisterClassA
Sections
.text Size: 184KB - Virtual size: 184KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE