C:\Projects\xVDS_Apps\pdb_map_release\x9000.pdb
Static task
static1
Behavioral task
behavioral1
Sample
371386c7bb075bd29f6a1241cdd0f6e2640218043bf2368ca901ca7fedcb75fa_NeikiAnalytics.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
371386c7bb075bd29f6a1241cdd0f6e2640218043bf2368ca901ca7fedcb75fa_NeikiAnalytics.dll
Resource
win10v2004-20240611-en
General
-
Target
371386c7bb075bd29f6a1241cdd0f6e2640218043bf2368ca901ca7fedcb75fa_NeikiAnalytics.exe
-
Size
137KB
-
MD5
d799d5d3500932f4a897b1c455fc9910
-
SHA1
72de0e23fdb225af48c84467c7456c9e74fb62aa
-
SHA256
371386c7bb075bd29f6a1241cdd0f6e2640218043bf2368ca901ca7fedcb75fa
-
SHA512
9f991c0f0fa39e1625a56aac67580a501a438fe3e0f39cf9ae88ec0ef008b5da963893caed7a68f911ddc0e6246212e132cc8a5b57b4f4b0d9d823e2b2da1f59
-
SSDEEP
3072:SbjW6lpAAb6+z8seonkDtXlrFogU8UJlevV6IcB:0a6lp9Guf2XlpS8UJlCV69
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 371386c7bb075bd29f6a1241cdd0f6e2640218043bf2368ca901ca7fedcb75fa_NeikiAnalytics.exe
Files
-
371386c7bb075bd29f6a1241cdd0f6e2640218043bf2368ca901ca7fedcb75fa_NeikiAnalytics.exe.dll windows:6 windows x86 arch:x86
437e7d0140dfae1ab28bbf67035f7e25
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
xvdsapi
?xVDS_GetFunctionAddress@@3P6GP6GFXZJJ@ZA
_xVDS_GetModulePlaybackStatus@8
_xVDS_GetModuleIDFromHandle@8
?xVDS_ParseMsg@@YGFJPAEFK@Z
?xVDS_IsRemoteConnection@@YGFJPAH@Z
?xVDS_ApplyDPMask@@YGFJJJPAEF0PAFK@Z
?xVDS_GetGroupCount@@YGFJJJPAJ@Z
?xVDS_GetGroup@@YGFJFFFFPAKPA_WJPADJ@Z
?xVDS_GetNumQueryMsgs@@YGFJPAJ@Z
?xVDS_SetFaultGroupCleared@@YGFJK@Z
?xVDS_EnableParsing@@YGFJJ@Z
?xVDS_SetDPValueEx@@YGFJKPAEFPAFK@Z
?xVDS_RemoveNotifyModule@@YGFJ@Z
?xVDS_AddNotifyModule@@YGFJ@Z
?xVDS_LoadBinFile@@YGFJPA_W@Z
?xVDS_Disconnect@@YGFJ@Z
?xVDS_Connect@@YGFJPADF0H@Z
_xVDS_GetModuleIDs@12
_xVDS_GetModuleHandles@12
?xVDS_GetAbort@@YGFJPAH@Z
?xVDS_SetAbort@@YGFJH@Z
?xVDS_GetFullPath@@YGFPA_W0J@Z
?xVDS_RecordEndSession@@YGFJPA_W@Z
?xVDS_RecordStop@@YGFJ@Z
?xVDS_RecordStart@@YGFJJH@Z
?xVDS_RecordStartSession@@YGFPAJJFJ0J@Z
?xVDS_SendCommand@@YGFJJPAEJJJP6AFXZ@Z
xVDS_WriteFmtMsgToLog
_xVDS_WriteMsgToLog@20
?xVDS_LoadResourceStringByName@@YGFKPA_WW4ResStringType@@0F@Z
?xVDS_LoadResourceString@@YGFKKW4ResStringType@@PA_WF@Z
?xVDS_SetComponentVisible@@YGFJFFH@Z
?xVDS_GetDataPointValueStr@@YGFJKKFPA_WFPAJ@Z
?xVDS_GetDPDescription@@YGFJKJPA_WJPADJ@Z
?xVDS_GetVDSIDFromMsg@@YGFJJKPAK@Z
?xVDS_GetVDSIDCountFromMsg@@YGFJJPAK@Z
?xVDS_GetSysTime@@YGFPAK@Z
?xVDS_HoldPendingNotifications@@YGFJH@Z
?xVDS_EnableComponent@@YGFJPAD0J@Z
?xVDS_GetMsgType@@YGFJJPAE@Z
?xVDS_GetDPIDbyName@@YGFJPADPAK@Z
?xVDS_FindMsg@@YGFJKPAK@Z
?xVDS_GetDPAttributes@@YGFJKPAUsDpAttribute@@@Z
?xVDS_GetQueryMsg@@YGFJKPAEPAFPAJ@Z
?xVDS_SetDPValue@@YGFJKPAEFK@Z
?xVDS_MsgMatch@@YGFJPAEFPAFPAK@Z
?xVDS_GetVehicleCount@@YGFJPAF@Z
?xVDS_GetVehicle@@YGFJJJPA_WJPADJ@Z
?xVDS_GetComponentCount@@YGFJJPAF@Z
?xVDS_GetComponent@@YGFJJJJPA_WJPADJ@Z
?xVDS_SendMsg@@YGFJPAEJJJP6AFXZ@Z
kernel32
DeleteCriticalSection
DisableThreadLibraryCalls
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
DecodePointer
EncodePointer
IsProcessorFeaturePresent
IsDebuggerPresent
InitializeCriticalSection
GetPrivateProfileSectionW
WritePrivateProfileStringW
WritePrivateProfileSectionW
GetPrivateProfileStringW
GetPrivateProfileSectionNamesW
MultiByteToWideChar
WideCharToMultiByte
WaitForMultipleObjects
CreateMutexW
OutputDebugStringW
GetLocalTime
CreateProcessW
GetLastError
CloseHandle
ExitThread
GetCurrentThreadId
Sleep
CreateEventW
WaitForSingleObject
ReleaseMutex
ResetEvent
SetEvent
user32
EnumThreadWindows
MessageBoxW
EndDialog
MessageBeep
GetClassNameW
msvcr120
wcsrtombs
iswalpha
wcsstr
swscanf
_wtol
_wtoi
abs
mbtowc
_wcsicmp
wcsncat
wcscspn
strncmp
_stricmp
atoi
sscanf
__CxxFrameHandler3
_time64
atol
atof
wcsncpy
wcscpy
wcscat
mbsrtowcs
_purecall
_beginthreadex
free
_wcsdup
_crt_debugger_hook
__crtUnhandledException
__crtTerminateProcess
??1type_info@@UAE@XZ
__CppXcptFilter
_amsg_exit
_malloc_crt
_initterm
_initterm_e
?terminate@@YAXXZ
_lock
_unlock
_calloc_crt
__dllonexit
_onexit
__clean_type_info_names_internal
_except_handler4_common
_strnicmp
_itoa
_strupr
_wcsnicmp
strtok
strstr
strchr
strcmp
strcat
memset
memcpy
strcpy
strlen
strncpy
wcscmp
wcslen
??2@YAPAXI@Z
??3@YAXPAX@Z
sprintf
_swprintf
Exports
Exports
?AsciiToMBSEx@@YAHPA_WPBD@Z
?AsciiToMBSRaw@@YAHPBDFPA_WF@Z
?ConvertStrToDouble@@YANPB_W@Z
?GetBigEndian@@YAXPAGPBE@Z
?GetBigEndian@@YAXPAKPBE@Z
?GetLittleEndian@@YAXPAGPBE@Z
?GetLittleEndian@@YAXPAKPBE@Z
?GetLittleEndian@@YAXPANPBE@Z
?IsAlphaString@@YAHPB_W@Z
?MBSToAsciiEx@@YAHPADPB_W@Z
?Make_ASCII@@YAHPADPB_W@Z
?PutBigEndian@@YAXPAEK@Z
?Reorder@@YAXAAG@Z
?Reorder@@YAXAAK@Z
AsciiToMBS
GetDllInfo
MBSToAscii
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ