C:\Users\fuess_000\Source\Repos\project1\Debug\project1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a47b45550e1a0b45c4aeede449fef0c0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a47b45550e1a0b45c4aeede449fef0c0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
a47b45550e1a0b45c4aeede449fef0c0_NeikiAnalytics
-
Size
376KB
-
MD5
a47b45550e1a0b45c4aeede449fef0c0
-
SHA1
b46e61e675ffe39bd1360eb19c46ab828b067af8
-
SHA256
84c80553d14d0b341612ce034e0adc23a997df2b7392ceeeb1927b03ad04a843
-
SHA512
9789105c5d7dbcf3c68730e76209c0f7aaf0853aa8807c0f50c1b77806cfc661d8365295fa6ef439fb8b134dfbdae9e5edd0ea9df0e8dcedaf08856b7480dc0a
-
SSDEEP
6144:cR3Y2qhKxm+gAc5uyzrpSRJ0F/p/uwONct43j92U7:cRIGm+gr551j9pGHNu4B2U7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a47b45550e1a0b45c4aeede449fef0c0_NeikiAnalytics
Files
-
a47b45550e1a0b45c4aeede449fef0c0_NeikiAnalytics.exe windows:6 windows x86 arch:x86
5705fbfdc521c015f4ede65dd35941d8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc140ud
ord5971
ord5912
ord5918
ord5924
ord5906
ord5961
ord5894
ord2033
ord2012
ord2026
ord2000
ord1978
ord14241
ord14245
ord16316
ord3857
ord11065
ord12887
ord12679
ord8456
ord4739
ord3089
ord5393
ord14184
ord10763
ord17181
ord13868
ord4477
ord14049
ord10945
ord13645
ord13644
ord6832
ord12115
ord12111
ord12113
ord12114
ord12112
ord17378
ord1610
ord3313
ord3027
ord5156
ord9876
ord12081
ord3899
ord3902
ord16164
ord7549
ord2736
ord1653
ord1645
ord2687
ord9016
ord15857
ord8649
ord550
ord3763
ord10126
ord5992
ord5993
ord7426
ord14518
ord2045
ord7224
ord16090
ord16100
ord7229
ord16098
ord7228
ord5268
ord4685
ord3088
ord5392
ord13333
ord7251
ord10618
ord11166
ord1266
ord2942
ord5057
ord9875
ord11021
ord13721
ord13716
ord6486
ord14141
ord4483
ord5499
ord14063
ord11046
ord14132
ord13398
ord12231
ord11115
ord5266
ord1060
ord15974
ord1579
ord1078
ord10216
ord1592
ord9164
ord9006
ord1652
ord1176
ord12076
ord6994
ord17154
ord16776
ord3752
ord3751
ord4017
ord4016
ord4759
ord12304
ord13299
ord12901
ord5955
ord1223
ord2928
ord5037
ord11018
ord3312
ord16160
ord7547
ord14092
ord14183
ord14233
ord9885
ord14215
ord7198
ord4493
ord8268
ord1095
ord16367
ord15450
ord7728
ord17261
ord7729
ord17262
ord7727
ord17260
ord9592
ord14599
ord17050
ord13920
ord13921
ord2379
ord9533
ord15117
ord4757
ord4819
ord11212
ord17188
ord9511
ord17182
ord14609
ord14610
ord2887
ord6470
ord10024
ord5352
ord9589
ord5501
ord15030
ord15098
ord12265
ord14223
ord10108
ord1606
ord3024
ord5153
ord10210
ord2686
ord2693
ord2708
ord2564
ord1225
ord7941
ord493
ord14137
ord11044
ord2616
ord1102
ord8273
ord6303
ord6711
ord6991
ord11164
ord6679
ord6306
ord6537
ord6282
ord9264
ord9265
ord9254
ord6535
ord9889
ord11017
ord1517
ord963
ord5036
ord2927
ord1220
ord5570
ord5453
ord9407
ord4981
ord4989
ord16901
ord5524
ord16912
ord3114
ord14558
ord14229
ord6255
ord10265
ord4823
ord15192
ord16650
ord16651
ord9368
ord16655
ord15189
ord16632
ord16633
ord9324
ord10677
ord16638
ord16076
ord7203
ord16538
ord15525
ord6093
ord15265
ord15270
ord15279
ord5900
ord5977
ord5932
ord5870
ord5885
ord5946
ord5405
ord7021
ord11511
ord5391
ord3635
ord17183
ord9512
ord17189
ord8290
ord13636
ord6234
ord16093
ord7225
ord3220
ord14085
ord4596
ord3976
ord3977
ord10840
ord3856
ord15034
ord15123
ord3882
ord481
ord9968
ord14718
ord14697
ord16189
ord15482
ord7936
ord1175
ord3881
ord371
ord15341
ord1660
ord14041
ord9165
ord2804
kernel32
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
RaiseException
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
OutputDebugStringA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetModuleHandleA
DecodePointer
SetLastError
EnterCriticalSection
OutputDebugStringW
GetModuleHandleW
GetProcAddress
LoadLibraryW
GetCurrentThreadId
CloseHandle
SetEvent
FreeLibrary
VirtualQuery
TerminateProcess
GetCurrentProcess
WideCharToMultiByte
MultiByteToWideChar
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
CreateEventW
WaitForSingleObjectEx
ResetEvent
GetLastError
user32
LoadCursorW
UnregisterClassW
PostQuitMessage
PeekMessageW
gdi32
DeleteDC
comctl32
InitCommonControlsEx
oleaut32
SysFreeString
gdiplus
GdiplusShutdown
GdiplusStartup
GdipDrawImageRect
GdipBitmapGetPixel
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromFile
GdipDisposeImage
GdipCloneImage
GdipDeleteFont
GdipCreateFont
GdipDeleteFontFamily
GdipCreateFontFamilyFromName
GdipFillRectangleI
GdipScaleWorldTransform
GdipTranslateWorldTransform
GdipCreateSolidFill
GdipDeleteBrush
GdipCloneBrush
GdipFree
GdipAlloc
GdipDeleteGraphics
GdipCreateFromHDC
msvcp140d
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@H@Z
?_Xlength_error@std@@YAXPBD@Z
vcruntime140d
_CxxThrowException
memcpy
memmove
_purecall
memset
_except_handler4_common
__std_type_info_destroy_list
__vcrt_GetModuleFileNameW
__vcrt_GetModuleHandleW
__vcrt_LoadLibraryExW
__CxxFrameHandler3
ucrtbased
wcscpy_s
__stdio_common_vswprintf
__stdio_common_vswprintf_s
__stdio_common_vsnwprintf_s
free
malloc
_CrtDbgReportW
_seh_filter_exe
_set_app_type
__setusermatherr
_configure_wide_argv
_initialize_wide_environment
_get_wide_winmain_command_line
_initterm
_initterm_e
exit
_exit
_set_fmode
_cexit
_c_exit
wcslen
_configthreadlocale
_set_new_mode
__p__commode
_seh_filter_dll
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
_crt_at_quick_exit
terminate
_controlfp_s
strcpy_s
strcat_s
__stdio_common_vsprintf_s
_wmakepath_s
_wsplitpath_s
_invalid_parameter_noinfo
_errno
_recalloc
_register_thread_local_exe_atexit_callback
_CrtDbgReport
_invalid_parameter
Sections
.textbss Size: - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 206KB - Virtual size: 205KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msvcjmc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1024B - Virtual size: 777B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ