e:\Projects\Poker\Bin\CardD.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a0e305e55aa5bd267f9511b04f482c70_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a0e305e55aa5bd267f9511b04f482c70_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
a0e305e55aa5bd267f9511b04f482c70_NeikiAnalytics.exe
-
Size
3.4MB
-
MD5
a0e305e55aa5bd267f9511b04f482c70
-
SHA1
72df4854477dd1af17273e8d759917763754b568
-
SHA256
15f45060d3bea33bb43d63dda7c019ae2b7378884d718e491afe182f5330ac6e
-
SHA512
ce204834481348d2113d7b71af61ec75322ea3cb424261c1efba12b5ca218fda63680ac0069ebb9c50227dffb5a5187191d208ec2cca86e5ab39dbea255375ff
-
SSDEEP
49152:uoUDqloLjySg7v0MMdS2XiCMl6YPYkAWfQ3a4Fa7d5f:ZUDqBt7vL2XiCYPYkAWfQ3a4Fa7d5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a0e305e55aa5bd267f9511b04f482c70_NeikiAnalytics.exe
Files
-
a0e305e55aa5bd267f9511b04f482c70_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
d1bb71b1af53580ab2ce0ccc7bdef6fc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InterlockedIncrement
InterlockedDecrement
GetTempFileNameA
IsDBCSLeadByte
CompareStringA
DeleteFileW
MoveFileA
MoveFileW
GetTempFileNameW
IsBadWritePtr
SetEndOfFile
MultiByteToWideChar
WaitForMultipleObjects
SetEvent
WaitForSingleObject
CreateEventA
CreateThread
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
ReadFile
QueryPerformanceFrequency
QueryPerformanceCounter
GetTickCount
FlushViewOfFile
UnmapViewOfFile
VirtualFree
WriteFile
CreateFileMappingA
MapViewOfFile
VirtualAlloc
CreateFileA
GetFileSize
CloseHandle
GetModuleFileNameA
SetCurrentDirectoryA
CreateDirectoryA
DeleteFileA
CopyFileA
SetFileAttributesA
CreateProcessA
GetDriveTypeA
GetVolumeInformationA
GetConsoleCursorInfo
SetConsoleCursorInfo
SetConsoleTextAttribute
SetConsoleCursorPosition
GetConsoleScreenBufferInfo
FillConsoleOutputCharacterA
FreeConsole
AllocConsole
GetStdHandle
CreateFiber
ConvertThreadToFiber
SwitchToFiber
FindFirstFileA
FindNextFileA
FindClose
GetFileAttributesA
SetFileTime
GetFileTime
FreeResource
SetFilePointer
GetCurrentDirectoryA
GetSystemDirectoryA
GetWindowsDirectoryA
GetTempPathA
GlobalMemoryStatus
GetLocalTime
SleepEx
CreateMutexA
lstrcmpiA
GetFullPathNameA
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
DebugBreak
WideCharToMultiByte
lstrlenA
GetProcAddress
LoadLibraryA
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
GetProcessHeap
GetModuleFileNameW
VirtualQuery
FreeLibrary
GetVersionExA
GetModuleHandleA
OutputDebugStringA
GetLastError
CreateFileW
LockResource
LoadResource
SizeofResource
FindResourceA
FindResourceW
GetSystemInfo
IsProcessorFeaturePresent
user32
SystemParametersInfoA
GetKeyState
GetCursorPos
ScreenToClient
MoveWindow
GetDC
FillRect
GetDesktopWindow
PostMessageA
SetWindowLongA
GetWindowRect
SetWindowPos
SetWindowTextA
PeekMessageA
SetFocus
SetActiveWindow
RegisterClassA
SetRect
wsprintfA
PostQuitMessage
ReleaseDC
TranslateMessage
DispatchMessageA
MessageBoxA
GetSystemMetrics
CreateWindowExA
UpdateWindow
ShowWindow
LoadMenuA
LoadIconA
LoadCursorA
SendMessageA
ShowCursor
DefWindowProcA
ole32
CoTaskMemFree
CoUninitialize
CoInitializeEx
CoCreateInstance
msvcp90d
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?compare@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEHPBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@U_Has_debug_it@01@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0_Container_base_secure@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1_Container_base_secure@std@@QAE@XZ
?_Orphan_all@_Container_base_secure@std@@QBEXXZ
?_Debug_message@std@@YAXPB_W0I@Z
??0_Lockit@std@@QAE@H@Z
??1_Lockit@std@@QAE@XZ
?clear@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
msvcr90d
_amsg_exit
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
_encode_pointer
__getmainargs
_unlock
_CRT_RTC_INITW
memmove
tolower
strchr
strncmp
isspace
isalnum
atol
_ultoa
wcstombs
calloc
realloc
_exit
_XcptFilter
_cexit
exit
_ismbblead
_acmdln
_CrtSetCheckCount
_initterm
_initterm_e
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
_controlfp_s
__dllonexit
_invoke_watson
rand
__CxxFrameHandler3
??3@YAXPAX@Z
atan2
asin
acos
sqrt
fgetc
printf
isalpha
_vsnprintf_s
atof
atoi
sscanf_s
fputc
ferror
fseek
ftell
fread
fclose
fprintf
_wassert
fopen_s
sprintf
wcslen
wcsncmp
memcmp
memcpy
pow
log10
strcmp
strcpy
memmove_s
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
??2@YAPAXI@Z
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABV01@@Z
_CxxThrowException
_CrtDbgReportW
_invalid_parameter
_purecall
srand
memset
strlen
getchar
sin
atan
_CIsqrt
vfprintf
fopen
fflush
remove
_CIpow
wcsncpy
_ftol
strncpy
_controlfp
iswpunct
iswdigit
iswalpha
iswspace
modf
longjmp
_setjmp3
isdigit
_vsnprintf
sscanf
frexp
_strdate
_strtime
ldexp
free
_strdup
setlocale
floor
_CIasin
_CIacos
_finite
__CxxFrameHandler
_except_handler3
malloc
_snprintf
_stricmp
isxdigit
toupper
qsort
_isnan
fwrite
tmpfile
_fpclass
ceil
_CItanh
_CIsinh
_CIfmod
_CIexp
_CIcosh
__argc
__argv
_time64
vsprintf
strcat
gdi32
GetTextMetricsW
GetFontLanguageInfo
CreateFontIndirectA
CreateFontIndirectW
SetTextAlign
SetMapMode
CreateCompatibleDC
ExtTextOutA
SetBkMode
ExtTextOutW
GetStockObject
TextOutA
CreateFontA
GetCharABCWidthsA
GetGlyphOutlineW
GetOutlineTextMetricsA
GetCurrentObject
SetBkColor
SetTextColor
GetCharacterPlacementW
GetCharacterPlacementA
SelectObject
DeleteObject
DeleteDC
CreateDIBSection
GetGlyphOutlineA
GetTextMetricsA
GetObjectW
MoveToEx
GetObjectA
comdlg32
GetOpenFileNameA
ChooseColorA
GetSaveFileNameA
advapi32
RegCloseKey
RegOpenKeyA
RegSetValueExA
RegQueryValueExA
shell32
SHGetSpecialFolderLocation
SHGetMalloc
SHGetPathFromIDListA
ShellExecuteA
SHBrowseForFolderA
imm32
ImmGetContext
ImmNotifyIME
ImmGetCandidateListA
ImmGetCompositionStringA
ImmGetConversionStatus
ImmGetOpenStatus
ImmReleaseContext
ImmGetDefaultIMEWnd
winmm
mciSendCommandA
joyGetNumDevs
timeEndPeriod
timeBeginPeriod
timeGetTime
msvfw32
MCIWndCreateA
dsound
ord11
dinput8
DirectInput8Create
Sections
.textbss Size: - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 293KB - Virtual size: 292KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 120KB - Virtual size: 350KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ