c:\Users\Dec\Desktop\Contagion\source\Contagion\src\utils\bspzip\Release\bspzip.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2a9a468505834640f12783fb30bc6221acbfc15b27a1f84667db21fe35a039e3_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2a9a468505834640f12783fb30bc6221acbfc15b27a1f84667db21fe35a039e3_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
2a9a468505834640f12783fb30bc6221acbfc15b27a1f84667db21fe35a039e3_NeikiAnalytics.exe
-
Size
340KB
-
MD5
dadd2db7a705ddc4668e0bdd405599d0
-
SHA1
1c48e9ba35ccb9b20a7de9f1e990af6b03ae5a83
-
SHA256
2a9a468505834640f12783fb30bc6221acbfc15b27a1f84667db21fe35a039e3
-
SHA512
264607b99e6ff4d9805af52a38fa91415c0f22f34a95f67958ca402247cc7794f68a2b7e5893b76c529b14b54f17149551523daa40820c03a1386583a72ff787
-
SSDEEP
6144:ybXvQ3WP9lDGXK8BBJWe4yO+21cKfDG/qt1xAOvMF:qXYuqXvBBUCj21Rbv1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2a9a468505834640f12783fb30bc6221acbfc15b27a1f84667db21fe35a039e3_NeikiAnalytics.exe
Files
-
2a9a468505834640f12783fb30bc6221acbfc15b27a1f84667db21fe35a039e3_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
1a055a6fdf9f1430fbfcb62cf5e495d2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetEnvironmentVariableA
GetModuleFileNameA
GetModuleHandleA
CreateFileA
GetLocalTime
GetLastError
OutputDebugStringA
ReadFile
WriteFile
DeleteFileA
CloseHandle
FlushFileBuffers
SetConsoleTextAttribute
GetStdHandle
SetFilePointer
SetConsoleMode
ReadConsoleInputA
SetEndOfFile
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
CompareStringW
CompareStringA
GetTimeZoneInformation
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
MultiByteToWideChar
WideCharToMultiByte
GetProcAddress
LoadLibraryExA
GetCurrentProcessId
CreateFileMappingA
FreeLibrary
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
ExitProcess
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
GetFullPathNameA
CreateDirectoryA
FindNextFileA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
GetFileAttributesA
SetEnvironmentVariableA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetConsoleCP
GetConsoleMode
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
LoadLibraryA
InitializeCriticalSection
SetEnvironmentVariableW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
tier0
g_pMemAlloc
GetCPUInformation
CommandLine_Tier0
?DevMsg@@YAXPBDZZ
Msg
AssertValidStringPtr
_AssertValidWritePtr
_AssertValidReadPtr
ThreadWaitForObjects
Plat_IsInDebugSession
ReleaseThreadHandle
CreateSimpleThread
StackToolsNotify_LoadedLibrary
GetThreadedLoadLibraryFunc
?DevWarning@@YAXPBDZZ
?UnlockRead@CThreadSpinRWLock@@QAEXXZ
?LockForRead@CThreadSpinRWLock@@QAEXXZ
?UnlockWrite@CThreadSpinRWLock@@QAEXXZ
?LockForWrite@CThreadSpinRWLock@@QAEXXZ
??0CThreadSpinRWLock@@QAE@XZ
?Lock@CThreadFastMutex@@ACEXII@Z
Error
Warning
vstdlib
KeyValuesSystem
Exports
Exports
CreateInterface
cvar
g_pCVar
Sections
.text Size: 228KB - Virtual size: 227KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 62.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE