C:\Users\onw\Downloads\Spoofer 2.0 GREY\Spoofer 2.0 GREY\examples\example_win32_directx9\Release\Grey Spoofer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6e129b483c5c58b19ab45e70b3c1cdf0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6e129b483c5c58b19ab45e70b3c1cdf0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
6e129b483c5c58b19ab45e70b3c1cdf0_NeikiAnalytics.exe
-
Size
3.2MB
-
MD5
6e129b483c5c58b19ab45e70b3c1cdf0
-
SHA1
1765edef3db4c2f5f2b0f5794a2b4cabb4257f45
-
SHA256
ef2ea76106b16067c5338e7ac0c856fa1de0633a8a503423cc3506af7902a697
-
SHA512
9cd8b66269bf32b0c3e6548959d84e5c1479106e3f0a2d3526221e59f4f54538f11c478d4f3db4780b84b5293ece317b946422d5cfc5a4eda9bf35585d7314e1
-
SSDEEP
49152:3rlJyT5X5paY+ZA6OzynRASAKrqLG9hNEI2U79WkuXDVPOn:3yWYmAgSoNuU5WLXxP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 6e129b483c5c58b19ab45e70b3c1cdf0_NeikiAnalytics.exe
Files
-
6e129b483c5c58b19ab45e70b3c1cdf0_NeikiAnalytics.exe.exe windows:6 windows x64 arch:x64
db5a374fcfffc525e6bdf1e15d68605b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
d3d9
Direct3DCreate9
kernel32
IsDebuggerPresent
CheckRemoteDebuggerPresent
VirtualProtect
VirtualFree
VirtualAlloc
TerminateProcess
OpenProcess
CreateFileA
GetSystemInfo
GetModuleHandleW
SetUnhandledExceptionFilter
ReadFile
GetLogicalDrives
FindFirstFileW
FindNextFileW
WriteFile
SetFilePointer
GetTempPathW
FindClose
CreateFileW
GetTickCount64
CreateDirectoryW
GetFileAttributesW
GetLastError
GetConsoleWindow
SetFileAttributesW
LocalFree
GetCurrentProcess
HeapAlloc
HeapFree
QueryPerformanceCounter
LoadLibraryW
FormatMessageA
GetLocaleInfoEx
FindFirstFileExW
GetFileAttributesExW
SetFileInformationByHandle
AreFileApisANSI
GetFileInformationByHandleEx
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetThreadContext
CloseHandle
Process32FirstW
UnmapViewOfFile
GetCurrentThread
FreeLibrary
GetProcAddress
Process32NextW
Sleep
CreateFileMappingA
CreateToolhelp32Snapshot
QueryPerformanceFrequency
LoadLibraryA
GetLocaleInfoA
GetModuleHandleA
GlobalUnlock
WideCharToMultiByte
GlobalLock
GlobalFree
GlobalAlloc
MultiByteToWideChar
GetFileSizeEx
MapViewOfFile
user32
GetWindowRect
DestroyWindow
CreateWindowExW
SetClipboardData
GetClipboardData
DefWindowProcW
GetWindowLongW
SetCursorPos
GetSystemMetrics
GetCursorPos
OpenClipboard
CloseClipboard
EmptyClipboard
UnregisterClassW
RegisterClassExW
ReleaseCapture
IsWindowUnicode
GetClientRect
SetCursor
SetCapture
LoadCursorW
ScreenToClient
GetMessageExtraInfo
GetKeyState
GetCapture
ClientToScreen
wsprintfW
TrackMouseEvent
UpdateWindow
PostQuitMessage
LoadIconW
TranslateMessage
SetLayeredWindowAttributes
MoveWindow
GetForegroundWindow
GetKeyboardLayout
ShowWindow
DispatchMessageW
SetWindowLongA
PeekMessageW
advapi32
RegCreateKeyExW
SetNamedSecurityInfoW
RegSetValueExW
OpenProcessToken
FreeSid
RegCreateKeyW
RegQueryValueExW
RegEnumKeyExW
RegOpenKeyExW
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
SetEntriesInAclW
AllocateAndInitializeSid
AdjustTokenPrivileges
LookupPrivilegeValueW
shell32
SHGetPathFromIDListW
SHBrowseForFolderW
ShellExecuteW
SHGetMalloc
SHGetFolderPathW
ole32
CoCreateInstance
CoUninitialize
CoInitializeEx
CoSetProxyBlanket
oleaut32
SysFreeString
SysAllocString
VariantClear
msvcp140
?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
??Bid@locale@std@@QEAA_KXZ
?_Incref@facet@locale@std@@UEAAXXZ
?_Decref@facet@locale@std@@UEAAPEAV_Facet_base@3@XZ
?_Addfac@_Locimp@locale@std@@AEAAXPEAVfacet@23@_K@Z
?always_noconv@codecvt_base@std@@QEBA_NXZ
?out@?$codecvt@_WDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEB_W1AEAPEB_WPEAD3AEAPEAD@Z
??0?$codecvt@_WDU_Mbstatet@@@std@@QEAA@_K@Z
??1?$codecvt@_WDU_Mbstatet@@@std@@MEAA@XZ
??7ios_base@std@@QEBA_NXZ
?_Xlength_error@std@@YAXPEBD@Z
?_Xout_of_range@std@@YAXPEBD@Z
?_Throw_Cpp_error@std@@YAXH@Z
_Cnd_do_broadcast_at_thread_exit
_Thrd_detach
_Query_perf_frequency
??1_Lockit@std@@QEAA@XZ
??0_Lockit@std@@QEAA@H@Z
?_New_Locimp@_Locimp@locale@std@@CAPEAV123@AEBV123@@Z
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
?_Init@locale@std@@CAPEAV_Locimp@12@_N@Z
?uncaught_exception@std@@YA_NXZ
?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A
?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_Winerror_map@std@@YAHH@Z
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z
?_Random_device@std@@YAIXZ
?id@?$codecvt@_WDU_Mbstatet@@@std@@2V0locale@2@A
?_Syserror_map@std@@YAPEBDH@Z
_Thrd_id
_Query_perf_counter
_Thrd_join
?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAA_JPEB_W_J@Z
?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z
?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD@Z
?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W@Z
?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??4?$_Yarn@D@std@@QEAAAEAV01@PEBD@Z
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z
?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z
??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
imm32
ImmSetCandidateWindow
ImmReleaseContext
ImmGetContext
ImmSetCompositionWindow
dwmapi
DwmExtendFrameIntoClientArea
obsidium64
ord23
shlwapi
SHDeleteValueW
PathFileExistsW
StrStrW
SHDeleteKeyW
d3dx9_43
D3DXCreateTextureFromFileInMemoryEx
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__intrinsic_setjmp
_CxxThrowException
__current_exception
memcmp
memchr
memset
memmove
memcpy
longjmp
strrchr
wcsstr
__C_specific_handler
strstr
__std_terminate
__std_exception_copy
__std_exception_destroy
__current_exception_context
api-ms-win-crt-stdio-l1-1-0
_get_stream_buffer_pointers
_fseeki64
fsetpos
ungetc
setvbuf
fwrite
fseek
__stdio_common_vswprintf
fgetc
_wfopen
fputc
fgetpos
__stdio_common_vsprintf
fread
fclose
ftell
fflush
__stdio_common_vsscanf
__p__commode
_set_fmode
__stdio_common_vfprintf
__acrt_iob_func
api-ms-win-crt-utility-l1-1-0
srand
rand
qsort
api-ms-win-crt-string-l1-1-0
_wcsicmp
strcmp
strncpy
iswctype
strncmp
api-ms-win-crt-heap-l1-1-0
_set_new_mode
free
malloc
_callnewh
api-ms-win-crt-runtime-l1-1-0
_initterm
_initterm_e
_exit
exit
_c_exit
_register_thread_local_exe_atexit_callback
_set_app_type
_seh_filter_exe
_wassert
abort
_beginthreadex
terminate
_cexit
system
_get_narrow_winmain_command_line
_crt_atexit
_register_onexit_function
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
_invalid_parameter_noinfo_noreturn
api-ms-win-crt-convert-l1-1-0
strtol
api-ms-win-crt-math-l1-1-0
acosf
ceilf
sqrt
sinf
powf
pow
fmodf
cosf
sqrtf
__setusermatherr
api-ms-win-crt-filesystem-l1-1-0
remove
_lock_file
_unlock_file
api-ms-win-crt-locale-l1-1-0
___lc_codepage_func
_configthreadlocale
api-ms-win-crt-environment-l1-1-0
getenv
Sections
.text Size: 843KB - Virtual size: 843KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 273KB - Virtual size: 273KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ