E:\Avbypass\00_Notes\04_编译免杀\Intel\Debug\Intel.pdb
Behavioral task
behavioral1
Sample
4c5117d73d1c1e3696f8a55afff3f9c0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4c5117d73d1c1e3696f8a55afff3f9c0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
4c5117d73d1c1e3696f8a55afff3f9c0_NeikiAnalytics.exe
-
Size
13KB
-
MD5
4c5117d73d1c1e3696f8a55afff3f9c0
-
SHA1
0d4f037890addbfc11ac0fb493f641bd33277e8d
-
SHA256
826bf363a096b21fcb8b8ea7fd128a7ff360ad1599e024475dfe7159df119d38
-
SHA512
3fb1eee02967787073570d4840b40d77a53eea1331abdda2c368c4c9ed415881c70f09c68a3cdd24449696d514af9c38b1dbf60d58f0ead5159125e10f829223
-
SSDEEP
192:ooEMqq0d25duVqbyZoqIB6pf0KSAiwhe/PgY/0EtbBREPuny0i:ooEMud21koclCv/0Q8Punyl
Malware Config
Extracted
metasploit
windows/exec
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4c5117d73d1c1e3696f8a55afff3f9c0_NeikiAnalytics.exe
Files
-
4c5117d73d1c1e3696f8a55afff3f9c0_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
a7d44fadf32b6c571ea7bf0569802de1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleW
GetStartupInfoW
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
IsProcessorFeaturePresent
QueryPerformanceCounter
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
VirtualAlloc
vcruntime140d
__current_exception
__current_exception_context
__std_type_info_destroy_list
_except_handler4_common
memmove
memset
ucrtbased
__p___argc
__p___argv
__p__commode
__setusermatherr
_c_exit
_cexit
_configthreadlocale
_configure_narrow_argv
_controlfp_s
_crt_at_quick_exit
_crt_atexit
_execute_onexit_table
_exit
_get_initial_narrow_environment
_initialize_narrow_environment
_initialize_onexit_table
_initterm
_initterm_e
_register_onexit_function
_register_thread_local_exe_atexit_callback
_seh_filter_dll
_seh_filter_exe
_set_app_type
_set_fmode
_set_new_mode
exit
terminate
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 424B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 580B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ