_InitAP2@4
_InitAP@0
Static task
static1
Behavioral task
behavioral1
Sample
18ad97cbefa204662019ebbcfec362f0_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
18ad97cbefa204662019ebbcfec362f0_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
Target
18ad97cbefa204662019ebbcfec362f0_NeikiAnalytics
Size
317KB
MD5
18ad97cbefa204662019ebbcfec362f0
SHA1
8ab76d5624d7c81e497fcb3f18232f75616c12b0
SHA256
733078817e55e4e81edf1f3b517f85b6612e900c73cb6f2dc1b2b80ae10050c6
SHA512
912f2afb03ecec268dfd0601cfd993ec46a901860aec8a652e1d63ec56a52e45bf4c3c97cf83bb0c95bd6001eb459acb4454a1a83f5a9c5b2adf5c51aa53e45f
SSDEEP
6144:kaXm4n6kR+thqEKaAKrOl0XZrJmYdvCLzFAOAZe3:9XfRkt1AKr40XZcY9CLxA63
Checks for missing Authenticode signature.
resource |
---|
18ad97cbefa204662019ebbcfec362f0_NeikiAnalytics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DirectInput8Create
SetEvent
InitializeCriticalSection
DeleteCriticalSection
SetThreadContext
GetThreadContext
LoadLibraryA
CreateThread
lstrlenW
SetLastError
MapViewOfFile
IsDebuggerPresent
GetFileAttributesW
GetFileAttributesA
GetLastError
MapViewOfFileEx
SetFilePointer
GetFullPathNameA
lstrlenA
SetFilePointerEx
GetFileSize
GetFileSizeEx
WaitForSingleObject
CreateEventA
ResumeThread
TerminateProcess
CreateProcessA
CreateProcessW
FindNextFileA
FindFirstFileExA
GetTickCount
SetFileAttributesA
CopyFileA
CopyFileExA
DeleteFileA
MoveFileA
MoveFileExA
ReplaceFileA
LoadLibraryW
GetModuleHandleW
LoadLibraryExA
LoadLibraryExW
FindNextFileW
FindFirstFileW
FindFirstFileExW
GetFileAttributesExW
SetFileAttributesW
CopyFileW
CopyFileExW
DeleteFileW
MoveFileW
MoveFileExW
ReplaceFileW
Module32Next
Module32First
CreateToolhelp32Snapshot
GetCurrentProcessId
DisableThreadLibraryCalls
WaitForMultipleObjects
GetFileAttributesExA
InterlockedExchange
EnterCriticalSection
TerminateThread
LeaveCriticalSection
VirtualQuery
UnmapViewOfFile
CreateFileMappingW
CreateFileMappingA
GetCurrentThread
FlushInstructionCache
ExitProcess
SetUnhandledExceptionFilter
OutputDebugStringA
FindFirstFileA
FindClose
GetSystemInfo
VirtualAlloc
VirtualProtect
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
MultiByteToWideChar
WideCharToMultiByte
VirtualFree
GetModuleHandleA
GetProcAddress
GetCurrentProcess
CreateFileA
ReadFile
GetModuleFileNameA
GetCurrentDirectoryA
WriteFile
FreeLibrary
LocalFree
VirtualFreeEx
ReadProcessMemory
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
GetWindowsDirectoryA
InterlockedDecrement
GetVolumeInformationA
DeviceIoControl
HeapFree
HeapAlloc
IsBadReadPtr
CreateDirectoryA
CreateMutexA
ReleaseMutex
InterlockedIncrement
RtlUnwind
RaiseException
GetCurrentThreadId
GetCommandLineA
LCMapStringA
LCMapStringW
GetCPInfo
GetStringTypeA
GetStringTypeW
HeapDestroy
HeapCreate
HeapReAlloc
IsBadWritePtr
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
QueryPerformanceCounter
GetSystemTimeAsFileTime
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
HeapSize
IsBadCodePtr
GetOEMCP
SetStdHandle
FlushFileBuffers
SetEndOfFile
CloseHandle
Sleep
FindWindowA
CharUpperBuffA
MessageBoxA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RevertToSelf
ImpersonateSelf
RegSetValueExA
RegSetKeySecurity
RegCloseKey
GetUserNameA
RegQueryMultipleValuesW
RegQueryMultipleValuesA
RegQueryValueExW
RegQueryValueExA
RegQueryValueW
RegQueryValueA
RegQueryInfoKeyW
RegQueryInfoKeyA
RegOpenKeyExW
RegOpenKeyW
RegOpenKeyA
RegCreateKeyExW
RegCreateKeyExA
RegCreateKeyW
RegCreateKeyA
ShellExecuteExW
ShellExecuteExA
SHGetSpecialFolderPathA
SHGetFolderPathA
SHGetMalloc
ShellExecuteA
ShellExecuteW
SHGetPathFromIDListA
SHGetDesktopFolder
GetAdaptersInfo
CoInitializeEx
CoInitializeSecurity
CoUninitialize
CoCreateGuid
CoCreateInstance
CoSetProxyBlanket
SysFreeString
VariantInit
VariantChangeType
VariantClear
SysAllocString
_InitAP2@4
_InitAP@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ