C:\Users\정협\Documents\Visual Studio 2013\Projects\D3D 기말과제\Debug\Win32Project1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3f2b91d15be814d27832a5c1ab7fc970_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3f2b91d15be814d27832a5c1ab7fc970_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
3f2b91d15be814d27832a5c1ab7fc970_NeikiAnalytics.exe
-
Size
74KB
-
MD5
3f2b91d15be814d27832a5c1ab7fc970
-
SHA1
facc6051f83497e9b2741c003cccc489d758b86f
-
SHA256
bf4f88d1733bf053ff3c0371e1ceff3c9c1ffd57d98d078b101465db162a842d
-
SHA512
8a22ffa9164ee006389ed4daa5df1c01465f01e62e4d0c6bac66ea9cfb885337b352af24f1fc2cfae0a56c4275f182db6a741e440512e3280432f7052061dd73
-
SSDEEP
768:zdybnAKCz88aK8yKzE1MRV3Qq77i0CmVWwKel3h5+YpSvnXW6iuTHQ:EjnCz88aKENRV3QqnWeph5+YpKnXWx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 3f2b91d15be814d27832a5c1ab7fc970_NeikiAnalytics.exe
Files
-
3f2b91d15be814d27832a5c1ab7fc970_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
e4c319ec5a2289ab7e9c15fc51553a99
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
d3d9
Direct3DCreate9
d3dx9_43
D3DXMatrixInverse
D3DXVec3TransformCoord
D3DXCreateTextA
D3DXCreateTextureFromFileExA
D3DXMatrixRotationAxis
D3DXCreateFontIndirectA
D3DXMatrixPerspectiveFovLH
D3DXMatrixLookAtLH
D3DXMatrixScaling
D3DXVec3Normalize
D3DXCreateTextureFromFileA
winmm
timeGetTime
user32
LoadIconA
LoadCursorA
UpdateWindow
ShowWindow
CreateWindowExA
RegisterClassA
DefWindowProcA
PostMessageA
PeekMessageA
DispatchMessageA
TranslateMessage
MessageBoxA
GetAsyncKeyState
GetKeyState
PostQuitMessage
wsprintfA
gdi32
CreateFontIndirectA
DeleteDC
DeleteObject
SelectObject
GetStockObject
CreateCompatibleDC
msvcr120d
?terminate@@YAXXZ
__crtTerminateProcess
__crtUnhandledException
_crt_debugger_hook
__crtSetUnhandledExceptionFilter
_invoke_watson
_controlfp_s
wcscpy_s
_wmakepath_s
_wsplitpath_s
_except_handler4_common
??2@YAPAXI@Z
??3@YAXPAX@Z
memcpy
memset
vsprintf_s
__CxxFrameHandler3
_CRT_RTC_INITW
??1type_info@@UAE@XZ
_lock
_unlock
_CrtDbgReportW
_calloc_dbg
__dllonexit
_onexit
_XcptFilter
__crtGetShowWindowMode
_amsg_exit
__getmainargs
__set_app_type
_CrtSetCheckCount
exit
_exit
_cexit
_ismbblead
_configthreadlocale
__setusermatherr
_initterm_e
_initterm
_acmdln
_fmode
_commode
kernel32
HeapAlloc
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
WideCharToMultiByte
HeapFree
LoadLibraryExW
GetProcAddress
GetLastError
RaiseException
IsDebuggerPresent
DecodePointer
EncodePointer
GetProcessHeap
VirtualQuery
FreeLibrary
GetModuleFileNameW
GetModuleHandleW
MultiByteToWideChar
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ