C:\Users\liupp\Documents\Visual Studio 2008\Projects\test1\Debug\test1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
085cd9f215217bb7168a7a6e2ee5c80908f4c2ef01022e51a3896c635f3a24b4_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
085cd9f215217bb7168a7a6e2ee5c80908f4c2ef01022e51a3896c635f3a24b4_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
085cd9f215217bb7168a7a6e2ee5c80908f4c2ef01022e51a3896c635f3a24b4_NeikiAnalytics.exe
-
Size
31KB
-
MD5
9522b1b4efc0669ce832950c54365bb0
-
SHA1
ea88efad40e734c03e342dad6770fc350c176747
-
SHA256
085cd9f215217bb7168a7a6e2ee5c80908f4c2ef01022e51a3896c635f3a24b4
-
SHA512
20b2c262f4c54078a6e6fbe9ccb1be982ee8e4d705013baa75f70db2946058e707d1b833d67fd93b215cc90d772234a430a41e84f80cc25ff5bc12de0bf87ce4
-
SSDEEP
384:VET+1g4Co8WuRofP5AqAHnEdkxGviwUb25y+TCt8rpaG:KwggfeHskxG5U4yDua
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 085cd9f215217bb7168a7a6e2ee5c80908f4c2ef01022e51a3896c635f3a24b4_NeikiAnalytics.exe
Files
-
085cd9f215217bb7168a7a6e2ee5c80908f4c2ef01022e51a3896c635f3a24b4_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
c21f9170d47135941a4796201f5e6c76
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcr90d
__dllonexit
_lock
_unlock
_decode_pointer
_crt_debugger_hook
_invoke_watson
_controlfp_s
?terminate@@YAXXZ
_except_handler4_common
_initterm_e
_initterm
_CrtDbgReportW
_CrtSetCheckCount
__initenv
exit
_cexit
_XcptFilter
_exit
__getmainargs
_amsg_exit
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_CRT_RTC_INITW
scanf
_onexit
printf
kernel32
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
FreeLibrary
VirtualQuery
GetModuleFileNameW
GetProcessHeap
HeapAlloc
HeapFree
InterlockedCompareExchange
Sleep
InterlockedExchange
LoadLibraryA
GetProcAddress
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
DebugBreak
RaiseException
IsDebuggerPresent
UnhandledExceptionFilter
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ