C:\Users\hayat\Documents\Visual Studio 2019\repos\EdrawMax Loader\Release\Loader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
439d63bd36727195abf84c39bc14da10_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
439d63bd36727195abf84c39bc14da10_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
439d63bd36727195abf84c39bc14da10_NeikiAnalytics.exe
-
Size
106KB
-
MD5
439d63bd36727195abf84c39bc14da10
-
SHA1
33204a79dedaa6933e08607e4a66579b943c7688
-
SHA256
24d8162769dbb2d474cdcc07ffd12d9a17900a7eb6c2d52d3c6f8e9f9b243687
-
SHA512
a4589dc6ded868a77f9624b57e74f1093e9a5a0c3e4822ef97b63fb57e63a4a1db0b0c4d5798a41c8ae54f6349b8a9a08458bf4a62185120aa78454294efbfe5
-
SSDEEP
1536:Y4qXecs/Mdy3AWbByHGEM7pDcykW8gwvHIT5JW5V9Z2R+iDbETUoCq/WhcUy0oIm:Y4+dy3ATmEMHkrCJTNvMU8/0tV/j8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 439d63bd36727195abf84c39bc14da10_NeikiAnalytics.exe
Files
-
439d63bd36727195abf84c39bc14da10_NeikiAnalytics.exe.exe windows:6 windows x86 arch:x86
1a77a723c136fcd5c74504a571ed0d5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WriteProcessMemory
SetConsoleTitleA
TerminateProcess
CloseHandle
K32GetModuleInformation
ReadProcessMemory
CreateProcessA
K32EnumProcessModules
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleHandleW
user32
WaitForInputIdle
msvcp140
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?uncaught_exception@std@@YA_NXZ
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@D@Z
vcruntime140
__std_exception_destroy
_CxxThrowException
__std_exception_copy
memset
__current_exception_context
__current_exception
__std_terminate
__CxxFrameHandler3
_except_handler4_common
api-ms-win-crt-runtime-l1-1-0
_register_thread_local_exe_atexit_callback
_c_exit
_initialize_onexit_table
_register_onexit_function
_crt_atexit
_controlfp_s
terminate
system
_cexit
_seh_filter_exe
__p___argv
__p___argc
_set_app_type
_exit
exit
_initterm_e
_initterm
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
malloc
_callnewh
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.P6= Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ