D:\sbroot\obj\eip\x86_nt_5_debug\eip\dk\msg\SKY\debug_obj_v71\cmbmsgfed8171d.pdb
Static task
static1
Behavioral task
behavioral1
Sample
421fbd9bf0080c1fbbed50d02f365b071cdf3ea4881364176a4e9518ed6ab2a2_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
421fbd9bf0080c1fbbed50d02f365b071cdf3ea4881364176a4e9518ed6ab2a2_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
421fbd9bf0080c1fbbed50d02f365b071cdf3ea4881364176a4e9518ed6ab2a2_NeikiAnalytics.exe
-
Size
144KB
-
MD5
234ad514340cdf64c8a292a1cae65bf0
-
SHA1
d3ce526bf986d953d9893a7603c85c91ef7d7201
-
SHA256
421fbd9bf0080c1fbbed50d02f365b071cdf3ea4881364176a4e9518ed6ab2a2
-
SHA512
0b3026f73370fec7ee376a178e533723b6e9de0827aa5435f1a5314de3fc59a6074a68f50f3f1ff3a4d4b5508400c01f8859af23f06f0c5399ceb784fd889d70
-
SSDEEP
3072:RQnlrXN3VmWs/rY2xp3tmV0qPlagb3oP8Ag:RYlrXN3VmX/rPx9IVqng
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 421fbd9bf0080c1fbbed50d02f365b071cdf3ea4881364176a4e9518ed6ab2a2_NeikiAnalytics.exe
Files
-
421fbd9bf0080c1fbbed50d02f365b071cdf3ea4881364176a4e9518ed6ab2a2_NeikiAnalytics.exe.dll windows:4 windows x86 arch:x86
e7e0b58d05ed28f21fb87cde9fa6ee95
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetCurrentThreadId
GetCommandLineA
GetVersionExA
TerminateProcess
GetCurrentProcess
ExitProcess
GetProcAddress
GetModuleHandleA
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
SetLastError
GetLastError
GetCurrentThread
IsBadWritePtr
IsBadReadPtr
HeapValidate
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
UnhandledExceptionFilter
RtlUnwind
WriteFile
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
DebugBreak
InterlockedDecrement
OutputDebugStringA
LoadLibraryA
InterlockedIncrement
HeapReAlloc
VirtualAlloc
InitializeCriticalSection
VirtualQuery
InterlockedExchange
GetTimeFormatA
GetDateFormatA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
LCMapStringA
LCMapStringW
SetConsoleCtrlHandler
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetTimeZoneInformation
VirtualProtect
GetSystemInfo
SetFilePointer
GetLocaleInfoW
SetStdHandle
FlushFileBuffers
CompareStringA
CompareStringW
SetEnvironmentVariableA
CloseHandle
Sections
.text Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ