Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
3e85366a9f71beec29a82e2d5a4d8060_NEIKI.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3e85366a9f71beec29a82e2d5a4d8060_NEIKI.exe
Resource
win10v2004-20240226-en
Target
3e85366a9f71beec29a82e2d5a4d8060_NEIKI
Size
956KB
MD5
3e85366a9f71beec29a82e2d5a4d8060
SHA1
666b616ad6f116b4022818a199ae5530529db467
SHA256
f9c2f0f92ccf3b4014ae60a62131dc44d9811f27814ca490e87a15e2c8a3df37
SHA512
3f884f1e41572006b08ba452c6ce0299488643e8197dd2298146b7b814a9f0050e2081fe6ee8167f44f5b2c2ff9b6417af16d0b82d2ade45c05da43595ee152e
SSDEEP
24576:Da39S4E1G0vdrSwrRztGxiL8FgW4mrEH7DrI:I921G0FrS8RwxiL8FgW4y
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
C:\JobRelease\win\Release\stubs\x86\Updater.pdb
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
InternetCloseHandle
InternetSetStatusCallbackW
InternetCrackUrlW
InternetOpenW
InternetGetLastResponseInfoW
InternetReadFile
InternetQueryDataAvailable
FtpGetFileSize
InternetQueryOptionW
InternetSetOptionW
HttpQueryInfoW
InternetConnectW
HttpOpenRequestW
HttpSendRequestW
FtpOpenFileW
InternetErrorDlg
FtpCommandW
ord173
ord224
CertFreeCertificateContext
CertNameToStrW
WNetAddConnection2W
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetFileType
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetStdHandle
CopyFileExW
GetLastError
FileTimeToSystemTime
SystemTimeToFileTime
CompareFileTime
DeleteFileW
MoveFileW
CopyFileW
CreateFileW
CloseHandle
FindFirstFileW
RemoveDirectoryW
FindNextFileW
GetFileSize
CreateDirectoryW
SetFileAttributesW
GetFileTime
HeapDestroy
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
ReadFile
WriteFile
SetFilePointer
FindClose
GetTempPathW
GetTempFileNameW
GetProcAddress
GetSystemDirectoryW
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
LoadLibraryExW
LoadLibraryW
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
Process32NextW
GetCurrentProcess
GetCurrentProcessId
GetExitCodeProcess
WaitForSingleObject
FreeLibrary
GetModuleHandleW
GetCommandLineW
RaiseException
LocalFree
LocalAlloc
GetUserDefaultUILanguage
GetSystemTime
FileTimeToLocalFileTime
GetDateFormatW
GetTimeFormatW
GetLocaleInfoW
CreateProcessW
MultiByteToWideChar
WideCharToMultiByte
FormatMessageW
SetLastError
GetEnvironmentVariableW
GetModuleFileNameW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
lstrcmpiW
GetVersionExW
lstrlenW
CompareStringW
GetTickCount
GetExitCodeThread
TerminateThread
CreateThread
EnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
GetCurrentThreadId
OutputDebugStringW
GetLocalTime
FlushFileBuffers
GetStringTypeW
ResetEvent
CreateEventW
SetEvent
GlobalFree
MulDiv
InterlockedIncrement
InterlockedDecrement
QueryPerformanceFrequency
QueryPerformanceCounter
GetSystemDefaultLangID
GetPrivateProfileStringW
GetPrivateProfileSectionNamesW
WritePrivateProfileStringW
UnmapViewOfFile
ReleaseMutex
CreateFileMappingW
MapViewOfFile
CreateMutexW
OpenFileMappingW
OpenEventW
lstrcpynW
DecodePointer
GetACP
Module32FirstW
TerminateProcess
GetEnvironmentStringsW
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
FreeEnvironmentStringsW
IsDebuggerPresent
LoadLibraryExA
VirtualQuery
VirtualProtect
GetSystemInfo
SetStdHandle
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
Sleep
GetCPInfo
GetModuleHandleExW
ExitProcess
RtlUnwind
GetStartupInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
LCMapStringW
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetSubMenu
LoadMenuW
ModifyMenuW
GetMessagePos
SetCursorPos
RemovePropW
SetPropW
GetWindowDC
DrawEdge
GetActiveWindow
DialogBoxParamW
MoveWindow
GetSystemMenu
DrawMenuBar
RegisterWindowMessageW
GetMessageW
GetDesktopWindow
PostQuitMessage
SetMenuDefaultItem
GetMenuItemID
GetPropW
MonitorFromPoint
SetForegroundWindow
MessageBoxW
GetDlgCtrlID
FillRect
TrackMouseEvent
DestroyWindow
EndPaint
BeginPaint
SetCursor
SetCapture
PostMessageW
ReleaseCapture
GetCapture
GetClassInfoExW
EndDialog
MonitorFromWindow
GetMonitorInfoW
IsWindowVisible
GetWindowRect
MapWindowPoints
EnableWindow
GetDlgItem
GetWindow
RegisterClassExW
PtInRect
ScreenToClient
GetCursorPos
UpdateWindow
InvalidateRect
CharNextW
OffsetRect
ReleaseDC
GetDC
IsWindow
SetRectEmpty
GetWindowTextW
GetWindowTextLengthW
CreateWindowExW
SystemParametersInfoW
LoadCursorW
GetClassNameW
GetClientRect
DrawFocusRect
GetFocus
DrawTextW
GetSysColor
IsWindowEnabled
RedrawWindow
SetWindowPos
TrackPopupMenu
EnableMenuItem
DestroyMenu
PostThreadMessageW
LockWindowUpdate
UnregisterClassW
CallWindowProcW
DefWindowProcW
SetWindowLongW
GetSystemMetrics
ShowWindow
SetFocus
LoadImageW
DispatchMessageW
PeekMessageW
GetParent
SetWindowTextW
SendMessageW
GetWindowLongW
GetWindowThreadProcessId
EnumWindows
GetForegroundWindow
LoadStringW
PatBlt
CreateBitmap
SetTextColor
SetBkMode
GetStockObject
DeleteObject
DeleteDC
CreateFontIndirectW
SelectObject
GetObjectW
CreatePatternBrush
Shell_NotifyIconW
ShellExecuteW
SHBrowseForFolderW
ShellExecuteExW
SHGetFolderPathW
SHGetPathFromIDListW
CoCreateGuid
CoInitializeEx
CoTaskMemFree
CoUninitialize
CoCreateInstance
CoRevokeClassObject
CoRegisterClassObject
CoAddRefServerProcess
CoReleaseServerProcess
CLSIDFromString
CoResumeClassObjects
CoTaskMemRealloc
CoTaskMemAlloc
RevokeActiveObject
DispGetIDsOfNames
SysAllocString
LoadTypeLi
VarUI4FromStr
SysFreeString
DispInvoke
PathFileExistsW
PathAppendW
PropertySheetW
InitCommonControlsEx
DestroyPropertySheetPage
CreatePropertySheetPageW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ