C:\Users\Jerry\Downloads\Nemesis_Loader\Nemesis_Loader\x64\Release\Nemesis Loader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
098f7c566ef0e757373d34d6c679d640_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
098f7c566ef0e757373d34d6c679d640_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
098f7c566ef0e757373d34d6c679d640_NeikiAnalytics.exe
-
Size
3.6MB
-
MD5
098f7c566ef0e757373d34d6c679d640
-
SHA1
924462e8fcc73e1a4df79aec6a5e4202ed26db22
-
SHA256
95f3c3f77d4b87515231bc86e786c98db82e335f90dcf1a042a05d45048553e9
-
SHA512
18132f2772f70d3ff40efabc05c37f2462bc92ad9c328822f093f4fe6eec2b406cabc2b66f3d586264c50373e3e0106a4a4a9d9097cd07542fffec595bb9d08f
-
SSDEEP
49152:fNJ6VgXaj/zFX+HdcWkWo2KJ1pVgGHn3JvOs3hpUs:fNJczFX+CWAgYvbL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 098f7c566ef0e757373d34d6c679d640_NeikiAnalytics.exe
Files
-
098f7c566ef0e757373d34d6c679d640_NeikiAnalytics.exe.exe windows:6 windows x64 arch:x64
4253fdd5c72c99740672245ddfb349ca
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
d3d9
Direct3DCreate9
vmprotectsdk64
VMProtectIsDebuggerPresent
VMProtectIsVirtualMachinePresent
VMProtectIsProtected
VMProtectEnd
VMProtectBeginUltra
kernel32
CreateThread
GetCurrentThread
GetCurrentThreadId
OpenThread
GetExitCodeThread
ResumeThread
CreateProcessA
GetThreadContext
SetProcessMitigationPolicy
OpenProcess
GetSystemDirectoryA
VirtualQuery
MapViewOfFile
UnmapViewOfFile
GetModuleFileNameA
GetModuleHandleW
LoadLibraryW
CreateFileMappingA
QueryFullProcessImageNameA
QueryFullProcessImageNameW
GetStartupInfoA
AllocConsole
SetConsoleTitleA
GetConsoleWindow
K32GetModuleFileNameExA
K32GetModuleInformation
K32EnumDeviceDrivers
K32GetDeviceDriverBaseNameA
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
Process32First
Process32Next
Module32FirstW
Module32NextW
FindFirstFileW
OutputDebugStringA
K32QueryWorkingSetEx
SetThreadContext
GetLogicalDrives
ReadFile
SetFilePointer
WriteFile
GetTempPathA
GetTickCount64
GetThreadId
DeleteFileW
GetModuleFileNameW
SetThreadExecutionState
CreateFileMappingW
SuspendThread
FlushInstructionCache
GetFileSize
GetBinaryTypeW
GetEnvironmentVariableW
ResetWriteWatch
GlobalGetAtomNameW
HeapQueryInformation
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
SleepEx
VerifyVersionInfoA
GetTickCount
MoveFileExA
WaitForSingleObjectEx
GetEnvironmentVariableA
GetStdHandle
GetFileType
PeekNamedPipe
WaitForMultipleObjects
FormatMessageA
GetFileSizeEx
InitializeSListHead
GetFileInformationByHandleEx
AreFileApisANSI
SetFileInformationByHandle
ExitProcess
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetLocaleInfoEx
GetCurrentProcessId
WaitForSingleObject
DeleteCriticalSection
InitializeCriticalSectionEx
DeviceIoControl
GetProcessHeap
HeapSize
HeapFree
GetExitCodeProcess
HeapReAlloc
GetSystemTimeAsFileTime
HeapAlloc
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SleepConditionVariableSRW
WakeAllConditionVariable
VerSetConditionMask
VerifyVersionInfoW
lstrcmpiA
GetFileAttributesExW
K32EnumProcesses
K32EnumProcessModules
GetWriteWatch
TerminateProcess
K32GetModuleBaseNameA
RtlLookupFunctionEntry
VirtualProtect
SetLastError
GetModuleHandleA
GetProcAddress
ReadProcessMemory
Sleep
CloseHandle
GetSystemInfo
HeapDestroy
RaiseException
Beep
CheckRemoteDebuggerPresent
WaitForDebugEvent
ContinueDebugEvent
IsDebuggerPresent
CreateFileW
CreateFileA
GetCommandLineA
RtlCaptureContext
LoadLibraryA
FreeLibrary
QueryPerformanceFrequency
QueryPerformanceCounter
WideCharToMultiByte
MultiByteToWideChar
GlobalFree
GlobalLock
GlobalUnlock
GlobalAlloc
LocalFree
GetLastError
SetFileAttributesA
FindNextFileA
FindFirstFileA
FindClose
VirtualFree
VirtualAlloc
GetCurrentProcess
user32
GetMonitorInfoA
MonitorFromWindow
SetWindowLongW
DefWindowProcA
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
wsprintfA
EnumDisplayMonitors
TranslateMessage
AdjustWindowRectEx
SetCursorPos
SetCursor
UnregisterClassA
ClientToScreen
ScreenToClient
WindowFromPoint
GetWindowLongW
SetWindowLongA
RegisterClassExA
CreateWindowExA
IsChild
DestroyWindow
DispatchMessageA
PeekMessageA
GetClientRect
SetWindowTextW
ReleaseDC
GetDC
SetForegroundWindow
GetForegroundWindow
ReleaseCapture
SetCapture
GetCapture
GetKeyState
SetFocus
BringWindowToTop
IsIconic
ShowWindow
SendMessageA
SetWindowPos
DefWindowProcW
PostQuitMessage
UnregisterClassW
LoadCursorA
SetLayeredWindowAttributes
GetCursorPos
GetClipboardData
RegisterClassExW
FindWindowExW
FindWindowW
GetClassNameW
GetWindowThreadProcessId
GetClassNameA
EnumWindows
FindWindowA
MessageBoxW
MessageBoxA
GetWindowTextA
UpdateWindow
GetSystemMetrics
CreateWindowExW
gdi32
GetDeviceCaps
advapi32
CryptGenRandom
AdjustTokenPrivileges
GetTokenInformation
LookupPrivilegeValueA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
AllocateAndInitializeSid
FreeSid
RegCreateKeyA
RegCreateKeyExA
RegSetValueExA
SetEntriesInAclA
SetNamedSecurityInfoA
IsValidSid
RegEnumKeyExA
ConvertSidToStringSidA
RegOpenKeyExW
CryptEncrypt
CryptImportKey
CryptDestroyKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CopySid
SetSecurityInfo
GetUserNameA
InitializeAcl
GetLengthSid
AddAccessAllowedAce
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
CryptAcquireContextA
CryptReleaseContext
OpenProcessToken
shell32
ShellExecuteA
ShellExecuteExA
SHGetFolderPathA
oleaut32
VariantClear
iphlpapi
GetAdaptersInfo
normaliz
IdnToAscii
ws2_32
WSAStartup
WSACleanup
accept
htonl
listen
ioctlsocket
__WSAFDIsSet
select
getaddrinfo
freeaddrinfo
recvfrom
sendto
gethostname
ntohl
WSAIoctl
WSASetLastError
socket
setsockopt
closesocket
recv
send
WSAGetLastError
ntohs
htons
getsockopt
getsockname
getpeername
connect
bind
wldap32
ord301
ord200
ord30
ord79
ord35
ord33
ord32
ord27
ord26
ord22
ord41
ord50
ord45
ord60
ord211
ord46
ord217
ord143
crypt32
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertFreeCertificateContext
CryptStringToBinaryA
PFXImportCertStore
CryptDecodeObjectEx
CertAddCertificateContextToStore
CertFindExtension
CertGetNameStringA
CryptQueryObject
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
CertGetCertificateChain
CertFreeCertificateChain
winhttp
WinHttpGetIEProxyConfigForCurrentUser
WinHttpConnect
WinHttpSendRequest
WinHttpCloseHandle
WinHttpOpenRequest
WinHttpOpen
WinHttpReceiveResponse
msvcp140
??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ
?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z
?_Random_device@std@@YAIXZ
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAADD@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
?setp@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z
?setp@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD0@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ
??7ios_base@std@@QEBA_NXZ
??Bios_base@std@@QEBA_NXZ
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z
?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?always_noconv@codecvt_base@std@@QEBA_NXZ
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
??Bid@locale@std@@QEAA_KXZ
?_Winerror_map@std@@YAHH@Z
?_Syserror_map@std@@YAPEBDH@Z
?_Throw_Cpp_error@std@@YAXH@Z
_Cnd_do_broadcast_at_thread_exit
_Thrd_id
_Thrd_join
_Thrd_detach
_Query_perf_frequency
_Query_perf_counter
?_Xout_of_range@std@@YAXPEBD@Z
??1_Lockit@std@@QEAA@XZ
??0_Lockit@std@@QEAA@H@Z
?_Xbad_function_call@std@@YAXXZ
?uncaught_exception@std@@YA_NXZ
_Thrd_sleep
_Xtime_get_ticks
?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ
??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z
??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z
?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?_Xlength_error@std@@YAXPEBD@Z
?good@ios_base@std@@QEBA_NXZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?setf@ios_base@std@@QEAAHHH@Z
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
?epptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ
?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ
?pbase@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ
?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ
?egptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ
?gbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXH@Z
?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z
?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z
imagehlp
ImageNtHeader
shlwapi
StrStrA
PathFileExistsA
SHDeleteKeyA
SHDeleteValueA
PathFindFileNameA
SHDeleteKeyW
psapi
GetModuleInformation
imm32
ImmGetContext
ImmSetCompositionWindow
ImmReleaseContext
ntdll
RtlFreeHeap
RtlAdjustPrivilege
NtDeviceIoControlFile
RtlGetFullPathName_UEx
RtlReleaseRelativeName
NtUnloadDriver
NtCreateFile
RtlAllocateHeap
RtlWriteRegistryValue
NtSetDebugFilterState
NtRaiseException
NtQueryInformationProcess
NtClose
RtlInitUnicodeString
NtUnmapViewOfSection
NtLoadDriver
NtCreateSection
RtlDosPathNameToRelativeNtPathName_U_WithStatus
RtlVirtualUnwind
NtRaiseHardError
NtQuerySystemInformation
NtMapViewOfSection
RtlCreateRegistryKey
userenv
UnloadUserProfile
rpcrt4
RpcStringFreeA
UuidCreate
UuidToStringA
vcruntime140
strrchr
_local_unwind
__current_exception
__current_exception_context
__std_terminate
__std_exception_copy
__std_exception_destroy
_CxxThrowException
__C_specific_handler
memcpy
memmove
__std_type_info_compare
memset
memcmp
strstr
memchr
strchr
wcsstr
vcruntime140_1
__CxxFrameHandler4
api-ms-win-crt-runtime-l1-1-0
_initterm_e
_initterm
exit
_exit
_Exit
abort
_c_exit
_configure_narrow_argv
strerror
_initialize_narrow_environment
_resetstkoflw
__p___argc
_initialize_onexit_table
_register_onexit_function
_crt_atexit
_cexit
_seh_filter_exe
_invalid_parameter_noinfo
_register_thread_local_exe_atexit_callback
_get_initial_narrow_environment
_beginthreadex
_errno
system
_getpid
__p___argv
_invalid_parameter_noinfo_noreturn
terminate
__sys_nerr
_set_app_type
quick_exit
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vsprintf_s
ungetc
fwrite
_wfopen
_popen
_pclose
_fseeki64
fsetpos
__stdio_common_vswprintf
fputc
fgets
_open
fgetpos
fgetc
feof
_get_stream_buffer_pointers
__stdio_common_vfprintf
__acrt_iob_func
fclose
_close
fopen
fputs
fflush
fread
fseek
_write
_lseeki64
_set_fmode
ftell
__stdio_common_vsprintf
__p__commode
__stdio_common_vsscanf
setvbuf
_read
api-ms-win-crt-heap-l1-1-0
malloc
calloc
_callnewh
_set_new_mode
free
realloc
api-ms-win-crt-string-l1-1-0
strpbrk
tolower
strcspn
wcscmp
wcslen
_stricmp
wcscat_s
wcscpy_s
strncmp
iswctype
strncpy
strnlen
strcat_s
strcpy_s
_wcsicmp
isupper
strcmp
toupper
_strdup
strspn
api-ms-win-crt-utility-l1-1-0
srand
rand
qsort
api-ms-win-crt-math-l1-1-0
cosf
sinf
sqrtf
acosf
__setusermatherr
fmodf
_dclass
api-ms-win-crt-convert-l1-1-0
strtoull
strtol
strtoul
atoi
strtod
strtoll
api-ms-win-crt-filesystem-l1-1-0
_access
_stat64
_unlock_file
remove
rename
_fstat64
_unlink
_lock_file
api-ms-win-crt-time-l1-1-0
_gmtime64
_time64
api-ms-win-crt-locale-l1-1-0
___lc_codepage_func
localeconv
_configthreadlocale
api-ms-win-crt-multibyte-l1-1-0
_mbsstr
_mbscmp
Sections
.text Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 317KB - Virtual size: 316KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 996KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 266KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ