E:\训练\HookKeyboardTest\Debug\MyProjectFirstImpl.pdb
Static task
static1
Behavioral task
behavioral1
Sample
652d3d00d9a51b104c56b4a4feace590_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
652d3d00d9a51b104c56b4a4feace590_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
652d3d00d9a51b104c56b4a4feace590_NeikiAnalytics
-
Size
117KB
-
MD5
652d3d00d9a51b104c56b4a4feace590
-
SHA1
2307e7bf7ea64f34ffa04149f0e4543bac7864e0
-
SHA256
a81ad26875a5204974f356ec99b99d19bd7842f5ba4b37ade2d11ead7d568a68
-
SHA512
eb81c921a1b3551fe20649b91cc59a332ee9dab4656ed4165f6453a212aacf6d12decd1952430c675f0c2dfed9311caafa5652b9ea9fbafeadada68d113b6342
-
SSDEEP
768:DJKG+wv1N1Lpbf+dUTpVOEuBWZU9QZU91SZkN:DAGP1HLpbWdUTHOSzHZkN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 652d3d00d9a51b104c56b4a4feace590_NeikiAnalytics
Files
-
652d3d00d9a51b104c56b4a4feace590_NeikiAnalytics.exe windows:5 windows x86 arch:x86
d8d45c6f9f9f38dfe5c21fbf3f041482
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcp100d
?uncaught_exception@std@@YA_NXZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
?good@ios_base@std@@QBE_NXZ
?tie@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEPAV?$basic_ostream@DU?$char_traits@D@std@@@2@XZ
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
?width@ios_base@std@@QBE_JXZ
?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDXZ
?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEPAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z
?width@ios_base@std@@QAE_J_J@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?flags@ios_base@std@@QBEHXZ
mfc100d
ord1435
msvcr100d
_except_handler4_common
_onexit
_lock
__dllonexit
_unlock
_invoke_watson
_controlfp_s
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
?terminate@@YAXXZ
_initterm_e
_initterm
_CrtDbgReportW
_CrtSetCheckCount
_ismbblead
strlen
memset
__CxxFrameHandler3
??_V@YAXPAX@Z
_CRT_RTC_INITW
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
_amsg_exit
__getmainargs
_exit
_XcptFilter
_cexit
exit
_acmdln
kernel32
lstrcmpiA
OpenProcess
VirtualAllocEx
Process32First
CreateToolhelp32Snapshot
EncodePointer
InterlockedExchange
Sleep
InterlockedCompareExchange
HeapSetInformation
GetStartupInfoW
WideCharToMultiByte
IsDebuggerPresent
MultiByteToWideChar
RaiseException
LoadLibraryW
lstrlenA
FreeLibrary
VirtualQuery
GetModuleFileNameW
GetProcessHeap
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
DecodePointer
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
Process32Next
WaitForSingleObject
CreateRemoteThread
GetProcAddress
GetModuleHandleA
WriteProcessMemory
VirtualFreeEx
TerminateProcess
user32
EndPaint
DefWindowProcA
UnhookWindowsHookEx
DestroyWindow
DialogBoxParamA
EndDialog
SetWindowsHookExA
ReleaseDC
DrawIcon
CreateIconIndirect
CopyIcon
CopyImage
PostQuitMessage
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
GetActiveWindow
OpenClipboard
MessageBoxA
EmptyClipboard
CloseClipboard
CallNextHookEx
BeginPaint
gdi32
CreateFontA
SelectObject
BeginPath
GetTextExtentPoint32A
SetBkMode
GetTextMetricsA
CreateCompatibleBitmap
BitBlt
CreateCompatibleDC
TextOutA
EndPath
GetTextExtentPointA
SelectClipPath
msimg32
AlphaBlend
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
oleaut32
SysFreeString
Exports
Exports
_HookLowLevelKeyboardProc@12
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ