D:\Code\Downloads\CuttingEdge0210\CuttingEdge0210\C#\TestCbtHook_CS\obj\Debug\TestCbtHook_CS.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ed16a65c55eab090a570d26dfebb0140_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
ed16a65c55eab090a570d26dfebb0140_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
ed16a65c55eab090a570d26dfebb0140_NeikiAnalytics.exe
-
Size
20KB
-
MD5
ed16a65c55eab090a570d26dfebb0140
-
SHA1
04344d0a5a410865bc1365b0bb8de6adf32b5cc6
-
SHA256
b818e44d61934c1ebff2b4a3225124ec95cc4386dc8c76f3f87b05c618fa5e17
-
SHA512
26c328e0ffa669e70f740d97f8ee130ef4782aa94e95b49caa6a195560ec3e2bfcf04a1c8ef8794a7fe4b854fd24d702e163db9855b847d99bc4a5a81ddb9acc
-
SSDEEP
96:k2R3yFmDgPFVzC6zAh3LqCuXpDxaWS8Q1Lsu:kw3Um8PFVzCsA9qCuXhhS8Q1w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ed16a65c55eab090a570d26dfebb0140_NeikiAnalytics.exe
Files
-
ed16a65c55eab090a570d26dfebb0140_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ