rdvgocl32.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0be6b4b3acf3bcd7378e22b4cb4b61233bb345d2b148515d5bb6a2bd42248680_NeikiAnalytics.dll
Resource
win10v2004-20240611-en
General
-
Target
0be6b4b3acf3bcd7378e22b4cb4b61233bb345d2b148515d5bb6a2bd42248680_NeikiAnalytics.exe
-
Size
1.3MB
-
MD5
fc17655402745e528d443b7dd3b88940
-
SHA1
cb9180e3c16a7f6a0c43da8df4d4093ef851780f
-
SHA256
0be6b4b3acf3bcd7378e22b4cb4b61233bb345d2b148515d5bb6a2bd42248680
-
SHA512
8da1662c36b0dd505fd4a9ced6dc09845a97535b7ea0bb369759913fdd38649708817db5d7c41155c6fad37310e211b36f4c9446953cbd6e2e64815513b43870
-
SSDEEP
6144:uGzak3IQ56KCeBJ+btGGXgUw5zaOihpGv8WHp9:7zak3XNCej+btGb5zzEWHv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0be6b4b3acf3bcd7378e22b4cb4b61233bb345d2b148515d5bb6a2bd42248680_NeikiAnalytics.exe
Files
-
0be6b4b3acf3bcd7378e22b4cb4b61233bb345d2b148515d5bb6a2bd42248680_NeikiAnalytics.exe.dll windows:10 windows x86 arch:x86
e8f555e100e77869c3b0c15e9ca7c86c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
?terminate@@YAXXZ
_onexit
__dllonexit
_unlock
_lock
_initterm
free
_amsg_exit
_XcptFilter
memmove
??1type_info@@UAE@XZ
_except_handler4_common
_beginthreadex
_endthreadex
memcmp
memcpy
_CxxThrowException
?what@exception@@UBEPBDXZ
??1exception@@UAE@XZ
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@ABQBDH@Z
??0exception@@QAE@ABQBD@Z
_callnewh
malloc
memcpy_s
_purecall
??_V@YAXPAX@Z
??3@YAXPAX@Z
__CxxFrameHandler3
memchr
memset
advapi32
GetTraceEnableFlags
RegisterTraceGuidsA
GetTraceEnableLevel
GetTraceLoggerHandle
TraceMessage
UnregisterTraceGuids
kernel32
TlsGetValue
TlsSetValue
WaitForMultipleObjects
AcquireSRWLockShared
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
SleepConditionVariableSRW
WakeAllConditionVariable
CreateFileA
GetFileSizeEx
GetLastError
ResetEvent
CreateEventA
CreateThreadpool
SetThreadpoolThreadMaximum
SetThreadpoolThreadMinimum
CreateThreadpoolCleanupGroup
CloseHandle
WaitForSingleObject
CloseThreadpoolCleanupGroupMembers
CloseThreadpoolCleanupGroup
CloseThreadpool
TrySubmitThreadpoolCallback
SetEvent
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
ReadFile
ReleaseSRWLockShared
TlsFree
GetModuleHandleW
Sleep
TlsAlloc
InitializeSRWLock
GetProcAddress
user32
EnumDisplayDevicesA
gdi32
CreateDCA
DeleteDC
rfxvmt
RfxVmtReadChannel
RfxVmtWriteChannel
RfxVmtCloseChannel
RfxVmtGetDataAvailableEvent
RfxVmtCreateChannel
Exports
Exports
DllMain
clGetExtensionFunctionAddress
clIcdGetPlatformIDsKHR
Sections
.text Size: 161KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ