IEProxy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3a43f1aa00b3031bcaa49bfc6591c2032817f1c29a43742ab77ddbc38071c628_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3a43f1aa00b3031bcaa49bfc6591c2032817f1c29a43742ab77ddbc38071c628_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
3a43f1aa00b3031bcaa49bfc6591c2032817f1c29a43742ab77ddbc38071c628_NeikiAnalytics.exe
-
Size
355KB
-
MD5
b0dc716d0674e0a4c845672cf8ab0720
-
SHA1
81c40946a0e553069b2ba2296f397cbbbad5ab35
-
SHA256
3a43f1aa00b3031bcaa49bfc6591c2032817f1c29a43742ab77ddbc38071c628
-
SHA512
b3d7f41f3f5b19f236d69ed3d6965a2f13f8e361fae68007741c6737f56c45264b6823b600fc21dc75f6a8d021ffe6d5bbf245977f83dd569bc06d5abe59804c
-
SSDEEP
3072:9o7zf4nqpAPUkUvFWbfNRgyyx9Stm0eD4YLry2lQBV+UdE+rECWp7hKf:9oX3qDUvUhRgVsBV+UdvrEFp7hKf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a43f1aa00b3031bcaa49bfc6591c2032817f1c29a43742ab77ddbc38071c628_NeikiAnalytics.exe
Files
-
3a43f1aa00b3031bcaa49bfc6591c2032817f1c29a43742ab77ddbc38071c628_NeikiAnalytics.exe.dll regsvr32 windows:6 windows x86 arch:x86
5acb8b029df1e2348b1c657f73b55460
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_initterm
malloc
memcpy_s
_purecall
_XcptFilter
iswalpha
__CxxFrameHandler3
free
_amsg_exit
_except_handler4_common
memcmp
??2@YAPAXI@Z
??3@YAXPAX@Z
_vsnwprintf
wcsstr
wcschr
memcpy
memset
kernel32
CompareStringOrdinal
DelayLoadFailureHook
LoadLibraryExA
GetModuleHandleW
GetCurrentDirectoryW
DisableThreadLibraryCalls
FreeLibrary
LoadLibraryExW
GetProcAddress
GetLocaleInfoEx
Sleep
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
CompareStringW
RegCloseKey
RegOpenKeyExW
RegGetValueW
RegQueryValueExW
GetFinalPathNameByHandleW
LocalFree
LocalAlloc
CreateFileW
CloseHandle
GetVersionExA
GlobalSize
GlobalLock
GlobalAlloc
GlobalUnlock
GetLastError
api-ms-win-downlevel-shlwapi-l1-1-0
PathIsURLW
QISearch
UrlApplySchemeW
ParseURLW
UrlCreateFromPathW
UrlCanonicalizeW
PathCreateFromUrlW
rpcrt4
RpcRaiseException
NdrStubCall2
NdrStubForwardingFunction
NdrClientCall2
NdrOleFree
NdrGetUserMarshalInfo
NdrOleAllocate
IUnknown_Release_Proxy
IUnknown_AddRef_Proxy
CStdStubBuffer_DebugServerRelease
CStdStubBuffer_DebugServerQueryInterface
IUnknown_QueryInterface_Proxy
CStdStubBuffer_CountRefs
CStdStubBuffer_IsIIDSupported
CStdStubBuffer_Invoke
CStdStubBuffer_Disconnect
CStdStubBuffer_Connect
CStdStubBuffer_AddRef
CStdStubBuffer_QueryInterface
NdrDllUnregisterProxy
NdrDllGetClassObject
NdrCStdStubBuffer2_Release
NdrDllCanUnloadNow
NdrDllRegisterProxy
NdrCStdStubBuffer_Release
api-ms-win-downlevel-shlwapi-l2-1-0
IUnknown_QueryService
IUnknown_SetSite
api-ms-win-downlevel-advapi32-l1-1-0
GetSidSubAuthorityCount
GetSecurityDescriptorDacl
GetAce
GetSidIdentifierAuthority
GetSidSubAuthority
GetKernelObjectSecurity
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetProxyDllInfo
Sections
.orpc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 227KB - Virtual size: 227KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 460B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ