C:\Users\Administrator\documents\visual studio 2012\Projects\CrypterStub\Release\CrypterStub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9e78e9916b28f233f051c5579a33a0c0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9e78e9916b28f233f051c5579a33a0c0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
9e78e9916b28f233f051c5579a33a0c0_NeikiAnalytics.exe
-
Size
8KB
-
MD5
9e78e9916b28f233f051c5579a33a0c0
-
SHA1
a6c1d53e35da15bfd2458e4c3f98d8b2dc1e5648
-
SHA256
aec8fee864170d0d3f0eebbe408d64cf06eeec33e67cf235fc85a3e4c8304e4b
-
SHA512
fbfffac95dfdd6113fc5087abf1fec3390ecd5cf0dcb245b96a5fd7b91339db4b50ecd3e874a8a273681566dc85dd4a96cad01cb8bdf6bcef68197366b3f0d21
-
SSDEEP
96:XfozxnzExeJ83PqfkPq+ZLt+UWdUSP5QGG1Wdd5PMR6KgkqAUcpVthcE0:g9zE483VZLt+NBPi8TlMR69kqenf0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9e78e9916b28f233f051c5579a33a0c0_NeikiAnalytics.exe
Files
-
9e78e9916b28f233f051c5579a33a0c0_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
a1ea0a295eb203c933237794ef360fed
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FreeResource
FindResourceW
LoadResource
SizeofResource
GetModuleFileNameW
GetProcAddress
VirtualAlloc
LockResource
GetModuleHandleA
TerminateProcess
Sleep
GetModuleHandleW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
GetStartupInfoA
InterlockedCompareExchange
GetCurrentThreadId
InterlockedExchange
msvcr80
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
_XcptFilter
_cexit
__getmainargs
_amsg_exit
wcstombs
strtok
??2@YAPAXI@Z
_exit
memcpy
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ