D:\Tfas11\Soft\CadBase\Cape\_Release32\dczsjyos.pdb
Static task
static1
Behavioral task
behavioral1
Sample
33ede5a3ac90b9c3ca0b0b4eee16aae4235e45fe926acccf76b6856928b9a80d_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
33ede5a3ac90b9c3ca0b0b4eee16aae4235e45fe926acccf76b6856928b9a80d_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
33ede5a3ac90b9c3ca0b0b4eee16aae4235e45fe926acccf76b6856928b9a80d_NeikiAnalytics.exe
-
Size
65KB
-
MD5
a5e721db1d25d1c29844e07b656871d0
-
SHA1
fca535ab314a23a88cb1a283eabdd23c82cb21aa
-
SHA256
33ede5a3ac90b9c3ca0b0b4eee16aae4235e45fe926acccf76b6856928b9a80d
-
SHA512
d55eaaba3fc087ea07edd2eaba107535a30799da3369c9b9996432327122f08fcb0a1b09778e24fc21acf079a5df9755eb47f8824dc89f7cdd501fc88155b4b5
-
SSDEEP
768:RPVmRQfOoqyuFhUJK9AYxCPjqohRSpL0oY/X0:RtmOfOoHUx9ApjLPoYX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 33ede5a3ac90b9c3ca0b0b4eee16aae4235e45fe926acccf76b6856928b9a80d_NeikiAnalytics.exe
Files
-
33ede5a3ac90b9c3ca0b0b4eee16aae4235e45fe926acccf76b6856928b9a80d_NeikiAnalytics.exe.dll windows:6 windows x86 arch:x86
cf646c7e87c2992b872452c79403c9ef
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
mfc110
ord1459
ord8191
ord12028
ord10228
ord12701
ord12638
ord4519
ord1500
ord7808
ord8130
ord5212
ord2430
ord12318
ord12317
ord14329
ord7470
ord14327
ord9203
ord4084
ord4023
ord12720
ord7753
ord1978
ord11766
ord11765
ord14201
ord12307
ord7811
ord14401
ord6192
ord14403
ord6194
ord8273
ord7734
ord14402
ord6193
ord987
ord6694
ord3786
ord5765
ord12020
ord8025
ord12032
ord12000
ord5107
ord5404
ord5614
ord9155
ord5380
ord5617
ord5110
ord5266
ord5091
ord7537
ord7538
ord7528
ord5264
ord8027
ord10047
ord9016
ord1498
ord3783
ord1501
ord324
ord1044
ord2305
ord2189
ord323
ord1043
ord2352
ord2355
ord2318
ord2354
ord484
ord2211
ord2316
ord2128
ord2242
ord2343
msvcr110
__clean_type_info_names_internal
__crtTerminateProcess
__crtUnhandledException
_crt_debugger_hook
_except_handler4_common
?terminate@@YAXXZ
_initterm_e
_initterm
_malloc_crt
free
__CppXcptFilter
??1type_info@@UAE@XZ
_onexit
__dllonexit
_calloc_crt
_unlock
_lock
memcpy
__CxxFrameHandler3
_CxxThrowException
_purecall
memmove
_amsg_exit
kernel32
GetCurrentProcessId
LocalAlloc
LocalFree
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
IsProcessorFeaturePresent
IsDebuggerPresent
msvcp110
?_Xlength_error@std@@YAXPBD@Z
?_Xout_of_range@std@@YAXPBD@Z
?_Syserror_map@std@@YAPBDH@Z
?_Winerror_map@std@@YAPBDH@Z
?_Xbad_alloc@std@@YAXXZ
daitecst
??0LDE_CSourceInfo@@QAE@PAD@Z
??1LDE_CSourceInfo@@QAE@XZ
?L_SetLocale_Init@@YAXXZ
dczlcomn
?data@@3PAUtagRPT@@A
?henkan@@3UHENKAN@@A
?bzifile@@3UBZI@@A
?bzi_wrt_t@@3UBZI_WRT_PRM@@A
dczscomn
?pipesrch@@YAHPAUPIPETBL@@PAUHEADTBL@@PAUSHOKICH@@H@Z
?zscSizeFreeTeesDraw@@YAHPAUHEADTBL@@PAUSHOKICH@@PAUBUZAI_SIZ6@@PAHPAUBZI_COM_PRM@@@Z
dczsyos
?yos01sc3@@YAHPAUYOS_TABLE@@HPAUHEADTBL@@PAUSHOKICH@@@Z
?yos01cap@@YAHPAUYOS_T@@HPAUHEADTBL@@PAUSHOKICH@@@Z
?yos41ls0@@YAHPAUYOS_T@@HPAUHEADTBL@@PAUSHOKICH@@@Z
?yos91ls0@@YAHPAUYOS_T@@HPAUHEADTBL@@PAUSHOKICH@@@Z
?yos92s00@@YAHPAUYOS_TABLE@@HPAUHEADTBL@@PAUSHOKICH@@@Z
?yos01sc1@@YAHPAUYOS_TABLE@@HPAUHEADTBL@@PAUSHOKICH@@@Z
?yos01sc4@@YAHPAUYOS_TABLE@@HPAUHEADTBL@@PAUSHOKICH@@@Z
?yosx1s00@@YAHPAUYOS_T@@HPAUHEADTBL@@PAUSHOKICH@@PAN@Z
?yos01sc2@@YAHPAUYOS_TABLE@@HPAUHEADTBL@@PAUSHOKICH@@@Z
Exports
Exports
jyost01cap
jyost01sc2
jyost01sc3
jyost01sc4
jyost01sct
jyost41l00
jyost41s00
jyost91l00
jyost91s00
jyost92s00
jyost92sfr
jyostx1s00
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 45KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ