F:\Study\skse\WeaponThrowVR\sksevr\x64\Release\WeaponThrowVR.pdb
Static task
static1
Behavioral task
behavioral1
Sample
dd10443887f9ad3a0489306d79e4b9f0_NEIKI.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dd10443887f9ad3a0489306d79e4b9f0_NEIKI.dll
Resource
win10v2004-20240508-en
General
-
Target
dd10443887f9ad3a0489306d79e4b9f0_NEIKI
-
Size
764KB
-
MD5
dd10443887f9ad3a0489306d79e4b9f0
-
SHA1
bd9133da3b8b61ed3d822a610589aed561a8fde0
-
SHA256
626904f4690091d7eac67d995c9a5f10c2ac7a3aa99a62795626b627ed395fcf
-
SHA512
128a5c4ab7fdea5ed4822781d890974b5ae0ea7a0addd80a077906674bbf5158d1a00bdf15080921f71f2f87e14e5ffbbe46ca8142234a4efa1649a71fe7edbf
-
SSDEEP
12288:S0KMfcI3KjEL1Ejw15sxpq8P+Sf72rKHX79EpHBC2RcbjoJkgUo:SDMfcI3KoREU15sxpq8P+Sf72rK37988
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dd10443887f9ad3a0489306d79e4b9f0_NEIKI
Files
-
dd10443887f9ad3a0489306d79e4b9f0_NEIKI.dll windows:6 windows x64 arch:x64
cc4dfce6578c75f1144034a9aa8f61a6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetFullPathNameW
FindNextFileW
FindClose
GetACP
MultiByteToWideChar
WideCharToMultiByte
Sleep
GetModuleHandleA
LoadLibraryA
QueryPerformanceFrequency
GetProcAddress
QueryPerformanceCounter
FindFirstFileExW
GetLastError
ReadFile
GetFileSizeEx
WriteFile
SetEndOfFile
CloseHandle
SetFilePointerEx
GetModuleFileNameA
VirtualProtect
VirtualFree
VirtualAlloc
VirtualQuery
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
TryEnterCriticalSection
FreeLibrary
WaitForSingleObjectEx
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
InitializeCriticalSectionEx
RtlPcToFileHeader
RaiseException
IsProcessorFeaturePresent
GetModuleHandleExW
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
EncodePointer
DecodePointer
LCMapStringEx
GetSystemTimeAsFileTime
GetOEMCP
GetModuleHandleW
GetStringTypeW
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
RtlUnwindEx
InterlockedFlushSList
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
CreateThread
ExitThread
FreeLibraryAndExitThread
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
ExitProcess
GetModuleFileNameW
GetStdHandle
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
HeapFree
HeapAlloc
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ReadConsoleW
GetCurrentDirectoryW
SetStdHandle
CreateDirectoryW
HeapReAlloc
HeapSize
GetTimeZoneInformation
IsValidCodePage
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
WriteConsoleW
AreFileApisANSI
RtlUnwind
user32
MessageBoxA
shell32
SHGetFolderPathA
Exports
Exports
SKSEPlugin_Load
SKSEPlugin_Query
Sections
.text Size: 549KB - Virtual size: 548KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 169KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ