D:\Универ\3 курс\2 сим\MetodWin\ELZAM\12\Debug\12.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ea2a6046e8e3685fc18b7ef56927d560_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ea2a6046e8e3685fc18b7ef56927d560_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
ea2a6046e8e3685fc18b7ef56927d560_NeikiAnalytics.exe
-
Size
79KB
-
MD5
ea2a6046e8e3685fc18b7ef56927d560
-
SHA1
3be03361999ca1e05d239ef205b7599bebc05db4
-
SHA256
036705bb251a85014543ea44bc096ed560836748d518a5ea82bac291a3ea9a8d
-
SHA512
226d7cadd6e995d220b423e6b74250462e4757b7a6ed300d0936a1143e65690bef421e2303fda1a92f8f25e097a21e2ea303d6f2a67ac1267bad3a2e0220ed86
-
SSDEEP
384:A/TqGEJi5u+nuYYgdW/I58TP3wUb4/8ts7NKME1xq3UZU9w1xq3UZU9MM1My:ETqGE+dWMmIUS8LMWZU9qZU9R1n
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea2a6046e8e3685fc18b7ef56927d560_NeikiAnalytics.exe
Files
-
ea2a6046e8e3685fc18b7ef56927d560_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
f48e68c8ba9484ddab1e202089aa7158
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
CheckRadioButton
InvalidateRect
EndDialog
DialogBoxParamA
DestroyWindow
CreateDialogParamA
DefWindowProcA
BeginPaint
EndPaint
PostQuitMessage
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
gdi32
Rectangle
msvcr90d
__p__commode
_encode_pointer
__set_app_type
_amsg_exit
__getmainargs
_exit
_XcptFilter
_cexit
exit
_ismbblead
_acmdln
_CrtSetCheckCount
_CrtDbgReportW
_initterm
_initterm_e
_crt_debugger_hook
?terminate@@YAXXZ
_controlfp_s
_invoke_watson
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_adjust_fdiv
__setusermatherr
_configthreadlocale
_CRT_RTC_INITW
__p__fmode
kernel32
VirtualQuery
GetModuleFileNameW
GetProcessHeap
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
FreeLibrary
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
LoadLibraryA
GetProcAddress
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
DebugBreak
RaiseException
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
IsDebuggerPresent
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ