D:\MyProjects\ProPilot\Test\Loader\Release\RdpZapper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0dd202be27c0b83bb92c1ec15b56a3b0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0dd202be27c0b83bb92c1ec15b56a3b0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
0dd202be27c0b83bb92c1ec15b56a3b0_NeikiAnalytics.exe
-
Size
435KB
-
MD5
0dd202be27c0b83bb92c1ec15b56a3b0
-
SHA1
ed6096444d192662f6c49bc33b3df465e6959ee2
-
SHA256
d58143aa80a1b086a500fddd936bdd452c72029535ff3d299b3c170a206b256c
-
SHA512
0395857224f48ca327e6cf28c1c193569f8281dfc524964466802b9094adab13e10b1baaddf9fb64177f526ed659b39f5a62ef4ad717237f70f4f704c37c1d02
-
SSDEEP
6144:DT1jFWUFpgaTuPC1HLEEurn9x+CzV6qz+CxHrC6EfsljKxs3TnUysuzPGj2e4gc:lFjFpgq514vbiCzVwCxLytmT0uzPQXc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 0dd202be27c0b83bb92c1ec15b56a3b0_NeikiAnalytics.exe
Files
-
0dd202be27c0b83bb92c1ec15b56a3b0_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
d4825ddda2e9d02e7b349e23c73f54aa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Sleep
VerSetConditionMask
VerifyVersionInfoW
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryA
FreeLibrary
TryEnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetCurrentThreadId
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InitializeSListHead
user32
GetDlgItemTextA
SetWindowPos
MessageBoxA
LoadIconA
GetSystemMetrics
DialogBoxParamA
EndDialog
GetWindowRect
vcruntime140
_except_handler4_common
memmove
__current_exception_context
strchr
memcpy
memset
__current_exception
api-ms-win-crt-runtime-l1-1-0
_set_errno
_controlfp_s
_errno
terminate
exit
_register_thread_local_exe_atexit_callback
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
_crt_atexit
_cexit
_seh_filter_exe
_set_app_type
_exit
_get_narrow_winmain_command_line
_initterm
_initterm_e
_c_exit
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vsscanf
__p__commode
_set_fmode
__stdio_common_vsprintf
api-ms-win-crt-heap-l1-1-0
_set_new_mode
free
malloc
realloc
api-ms-win-crt-string-l1-1-0
toupper
_stricmp
_strdup
_memicmp
strncpy
api-ms-win-crt-time-l1-1-0
_mktime64
api-ms-win-crt-convert-l1-1-0
atoi
atof
api-ms-win-crt-multibyte-l1-1-0
_mbsrchr
_mbschr
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ