D:\Program Files\Workspace\Snake\Debug\Snake.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7efe5211d360d59ccb092a5e3f929820_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7efe5211d360d59ccb092a5e3f929820_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
7efe5211d360d59ccb092a5e3f929820_NeikiAnalytics
-
Size
267KB
-
MD5
7efe5211d360d59ccb092a5e3f929820
-
SHA1
a945972928a62f6ca8c844e6de47317513de95ff
-
SHA256
da0d7343698d3f9bfbef92d395f073ec2bb144405d28990f082d71fdb12139f9
-
SHA512
d478c9e201533decd743a0a459dc0dbc9eaa9c4285aa3d3869b423971908f65ace9c488001c4cd0f486f74923110d2599357d82c3112e1fed0517ccf2a9c5470
-
SSDEEP
1536:coym/tWsUwj/LIhR8SAI6Vhcw8j6PoEq6hO6dpboXhxCZvnKLLdKpqbR+Xs7WE4u:cot/ssUOzajLp339f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7efe5211d360d59ccb092a5e3f929820_NeikiAnalytics
Files
-
7efe5211d360d59ccb092a5e3f929820_NeikiAnalytics.exe windows:5 windows x86 arch:x86
149aa6fe7baad912a7fbd92b55439893
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
DecodePointer
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetProcessHeap
GetProcAddress
lstrlenA
RaiseException
MultiByteToWideChar
IsDebuggerPresent
WideCharToMultiByte
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
InterlockedExchange
EncodePointer
FreeLibrary
GetModuleFileNameW
VirtualQuery
Sleep
LoadLibraryW
GetModuleHandleW
user32
GetDC
ReleaseDC
EndDialog
SetTimer
GetClientRect
DialogBoxParamW
DestroyWindow
DefWindowProcW
InvalidateRect
PtInRect
LoadBitmapW
BeginPaint
FillRect
EndPaint
PostQuitMessage
CreateWindowExW
SendMessageW
ShowWindow
UpdateWindow
LoadIconW
LoadCursorW
RegisterClassExW
LoadStringW
LoadAcceleratorsW
GetMessageW
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
gdi32
GetObjectW
CreateCompatibleDC
SelectObject
BitBlt
CreateSolidBrush
msvcr100d
_except_handler4_common
rand
_CRT_RTC_INITW
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
_amsg_exit
__wgetmainargs
_exit
_XcptFilter
_cexit
exit
_wcmdln
_CrtSetCheckCount
_CrtDbgReportW
_initterm
_initterm_e
_crt_debugger_hook
?terminate@@YAXXZ
_controlfp_s
_invoke_watson
_unlock
__dllonexit
_lock
_onexit
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 228KB - Virtual size: 227KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ