d:\p4stg\install\install\Monet\Apps\bin\win32\b_rel\ControlCenterActions.pdb
Static task
static1
Behavioral task
behavioral1
Sample
35238dd974f3fab7a50478773d28115a2893822a50d68ece139b347a74a9516c_NeikiAnalytics.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
35238dd974f3fab7a50478773d28115a2893822a50d68ece139b347a74a9516c_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
35238dd974f3fab7a50478773d28115a2893822a50d68ece139b347a74a9516c_NeikiAnalytics.exe
-
Size
330KB
-
MD5
2f004b4b1e842468c38dac1561b0efe0
-
SHA1
8f0def8c528c07313ef855da9f21ff01769636d5
-
SHA256
35238dd974f3fab7a50478773d28115a2893822a50d68ece139b347a74a9516c
-
SHA512
efca2aaf4067c8f4e9f782faeafa1337dec31c4a9a5557584a66ad49998a39ac6794de5d561d01248ecf49cca48393c7bb09f18099a7f0a081d2bb03fa001ab7
-
SSDEEP
3072:ax8i8iO/bB6JxYIqTst4hPuMthMoGbrYga75Sj//bcUzmaWOiizo2IR9cqsc/i:axWnzB6LKxIMPMoGvYgaFSzOxivyZ+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 35238dd974f3fab7a50478773d28115a2893822a50d68ece139b347a74a9516c_NeikiAnalytics.exe
Files
-
35238dd974f3fab7a50478773d28115a2893822a50d68ece139b347a74a9516c_NeikiAnalytics.exe.dll windows:4 windows x86 arch:x86
693b5ba0bb07ee66515612006923db31
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msi
ord74
ord34
ord80
ord17
ord125
ord103
ord8
shlwapi
SHDeleteKeyW
kernel32
FlushFileBuffers
lstrcatW
lstrcpyW
lstrlenW
SetFilePointer
TerminateProcess
OpenProcess
GetConsoleMode
GetConsoleCP
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
CloseHandle
LCMapStringW
GetLocaleInfoW
LoadLibraryA
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
HeapAlloc
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
LCMapStringA
GetCPInfo
GetStringTypeA
GetStringTypeW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetProcAddress
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetACP
GetOEMCP
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoA
HeapSize
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
advapi32
RegEnumKeyExW
RegSetValueExW
RegCreateKeyExW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegQueryInfoKeyW
shell32
SHFileOperationW
ShellExecuteW
Exports
Exports
DeleteINSTALLDIRFolder
DeleteRegistryLocalInfo
IsDOTNETInstalled
KillCCCProcesses
RegisterCOM
RegisterCOM64
SetRegistryLocalInfo
UnRegisterCOM
UnRegisterCOM64
UpdateRegInfo
Sections
.text Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ