DXCapsViewer.pdb
Static task
static1
General
-
Target
9751772e98ca76b53be7dd43b00ebbc0_NeikiAnalytics.exe
-
Size
720KB
-
MD5
9751772e98ca76b53be7dd43b00ebbc0
-
SHA1
06b1be17da1dde742ec749087b96bf5ac5b420e0
-
SHA256
b56dface8605f462fcb9f99c61626ca313d8f6521b54e3bdfee0511411d28f5e
-
SHA512
36dd63c57d24d1e8477cc77528f9ca52aa0b9b1fc4e3a9690d1bceb74d180db723659cea4139f8d185debced4cfd0d14c8efb6972096a5a56179690bc7a46292
-
SSDEEP
12288:fr2PdjXc3ajG+hjQKymY8efKCpD7Gj9G6G1qT8nQkCu83L3Wl/np9DBDt3kbE:fr21jsqjnhMgeiCl7G0nehbGZpbD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9751772e98ca76b53be7dd43b00ebbc0_NeikiAnalytics.exe
Files
-
9751772e98ca76b53be7dd43b00ebbc0_NeikiAnalytics.exe.exe windows:10 windows x86 arch:x86
af0fea4b3241ec32150f78cdad863062
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FreeLibrary
GetProcAddress
LoadLibraryExA
GlobalUnlock
GlobalLock
GlobalAlloc
GetNumberFormatA
GetCommandLineA
GetProcessHeap
HeapAlloc
CloseHandle
CreateFileA
GetModuleHandleA
WriteFile
GetLocaleInfoA
LocalAlloc
GetEnvironmentVariableA
HeapFree
Sleep
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
ExpandEnvironmentStringsA
GetModuleFileNameA
gdi32
DeleteDC
StartPage
StartDocA
EndDoc
GetDeviceCaps
GetTextMetricsA
CreateFontIndirectA
TextOutA
SelectObject
EndPage
SetAbortProc
user32
DialogBoxParamA
GetSystemMetrics
EndDialog
ScreenToClient
PostMessageA
GetDC
DestroyWindow
LoadCursorA
GetMenu
DispatchMessageA
LoadImageA
GetMessageA
LoadMenuA
DeferWindowPos
EnableWindow
GetParent
EnableMenuItem
PeekMessageA
CreateDialogParamA
GetWindowLongA
IsDialogMessageA
GetSubMenu
GetSystemMenu
EmptyClipboard
GetWindowTextA
SetWindowTextA
MessageBoxA
RegisterClassA
DefWindowProcA
DestroyMenu
CreateWindowExA
SetFocus
TranslateMessage
SendMessageA
SetCapture
EndDeferWindowPos
SetClipboardData
LoadIconA
SystemParametersInfoA
CheckMenuItem
GetClientRect
GetDlgItem
PostQuitMessage
TrackPopupMenu
ShowWindow
BeginDeferWindowPos
DestroyIcon
CloseClipboard
LoadStringA
GetMenuStringA
ReleaseCapture
InvalidateRect
IsIconic
ReleaseDC
GetCursorPos
SetMenuItemInfoA
OpenClipboard
msvcrt
vsprintf_s
_except_handler4_common
_controlfp
?terminate@@YAXXZ
_acmdln
_initterm
__setusermatherr
_ismbblead
__p__fmode
_cexit
memset
_ftol2
_exit
exit
__set_app_type
__getmainargs
_amsg_exit
__p__commode
_XcptFilter
free
_callnewh
malloc
wcstombs
sprintf_s
strrchr
strcat_s
strcpy_s
comctl32
ord17
ImageList_Destroy
ImageList_ReplaceIcon
ord4
ImageList_Create
comdlg32
PrintDlgA
ole32
CoInitialize
CoUninitialize
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
shell32
SHGetFolderPathA
shlwapi
PathFileExistsA
PathRemoveFileSpecA
PathAppendA
ddraw
DirectDrawCreateEx
DirectDrawEnumerateExA
d3d9
Direct3DCreate9
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
Sections
.text Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 576KB - Virtual size: 580KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE