C:\Users\catec\Documents\school\cpsc436d\project\contagion\target\release\build\syn-352ccb914e20941e\build_script_build-352ccb914e20941e.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5fa741b4a45113bc2f27cbd3b882c036daaa7a6682be325ac283b4a5f4d4ab6b_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
5fa741b4a45113bc2f27cbd3b882c036daaa7a6682be325ac283b4a5f4d4ab6b_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
5fa741b4a45113bc2f27cbd3b882c036daaa7a6682be325ac283b4a5f4d4ab6b_NeikiAnalytics.exe
-
Size
188KB
-
MD5
c2e8bd3f456271aead023b6a92010260
-
SHA1
9d4bf772ec4f2b59ffcb65a35b329f3075174a17
-
SHA256
5fa741b4a45113bc2f27cbd3b882c036daaa7a6682be325ac283b4a5f4d4ab6b
-
SHA512
c057fa6a527421dad11c82bcd8a0a7b601ba03331b4fe612c1b97905bd35f247ceb4359cedab0c3fc2b2644f39fc39c32043fe2d2b3d9f2ffe761f404c8eef1d
-
SSDEEP
3072:qzfK9JrzFj9Mso7hWQ0fyuaUvZ0COAJaqXGdg:WK97jFo7cMer0qXG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5fa741b4a45113bc2f27cbd3b882c036daaa7a6682be325ac283b4a5f4d4ab6b_NeikiAnalytics.exe
Files
-
5fa741b4a45113bc2f27cbd3b882c036daaa7a6682be325ac283b4a5f4d4ab6b_NeikiAnalytics.exe.exe windows:6 windows x64 arch:x64
8b2b38a165b2a106a3386f151777edc8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
SystemFunction036
kernel32
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
InitializeSListHead
GetCurrentThreadId
WriteConsoleW
GetConsoleMode
CreateNamedPipeW
CreateProcessW
FormatMessageW
SetHandleInformation
CancelIo
DeleteCriticalSection
GetLastError
CloseHandle
LeaveCriticalSection
FreeLibrary
FreeEnvironmentStringsW
SetLastError
GetCurrentDirectoryW
GetEnvironmentStringsW
GetEnvironmentVariableW
GetCurrentProcess
DuplicateHandle
ReadFile
WriteFile
InitializeCriticalSection
EnterCriticalSection
WaitForSingleObject
GetExitCodeProcess
CreateEventW
WaitForMultipleObjects
GetOverlappedResult
GetCurrentProcessId
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetProcessHeap
HeapAlloc
HeapFree
LoadLibraryW
RtlCaptureContext
TlsAlloc
TlsGetValue
TlsSetValue
HeapReAlloc
AddVectoredExceptionHandler
GetModuleHandleW
GetProcAddress
GetStdHandle
CreateFileW
GetFileInformationByHandle
DeviceIoControl
vcruntime140
__C_specific_handler
memset
memmove
memcpy
memcmp
__CxxFrameHandler3
_CxxThrowException
api-ms-win-crt-string-l1-1-0
strlen
api-ms-win-crt-runtime-l1-1-0
_initterm
_initterm_e
exit
_exit
_initialize_narrow_environment
__p___argc
__p___argv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_set_app_type
_seh_filter_exe
_get_initial_narrow_environment
_initialize_onexit_table
_register_onexit_function
_crt_atexit
terminate
_configure_narrow_argv
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
_set_new_mode
free
Sections
.text Size: 139KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 632B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ