DllUpdate
Install
MainThread
ServiceMain
Uninstall
Static task
static1
Behavioral task
behavioral1
Sample
53029d15293b68ac1a04fa951aed87b0_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
53029d15293b68ac1a04fa951aed87b0_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
Target
53029d15293b68ac1a04fa951aed87b0_NeikiAnalytics
Size
51KB
MD5
53029d15293b68ac1a04fa951aed87b0
SHA1
ad192472e92c9981038c29c8212f07c360cde40d
SHA256
e23a9d97327fbe8985c995bba24a1c20176c00e5413d437276f5647b4139a313
SHA512
f41ad27300790d7c233e0ec488ca81b464d9a7f512653b41328955a4b882787379b7f59bbb7cfeb8d052dab36fc8994157c4c017997b65a2026972fd6b2dfa2e
SSDEEP
768:3Er7XR1M6t6FikUE58ozVOB+6QcXn0cE5Y18BtrEZJjuSkwFOBezosAMC6Hh4:3EXXM2HEhzVWKtrEZFxFOBnpMC6H
Checks for missing Authenticode signature.
resource |
---|
53029d15293b68ac1a04fa951aed87b0_NeikiAnalytics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FreeLibrary
GetProcAddress
LoadLibraryA
GetTickCount
ReadFile
GetFileAttributesA
LocalFree
LocalSize
LocalAlloc
WinExec
lstrcatA
GetCurrentProcessId
Process32Next
TerminateProcess
OpenProcess
Process32First
CreateToolhelp32Snapshot
CopyFileA
GetModuleFileNameA
GlobalMemoryStatusEx
WaitForSingleObject
GetCurrentDirectoryA
FreeConsole
VirtualProtect
HeapFree
GetProcessHeap
HeapAlloc
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateThread
WritePrivateProfileStringA
GetSystemDirectoryA
GetPrivateProfileStringA
lstrcmpiA
SetEvent
CreateEventA
VirtualAlloc
InterlockedExchange
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
IsProcessorFeaturePresent
lstrcpyA
lstrlenA
GetLastError
GetFileSize
CreateFileA
SetFilePointer
WriteFile
CloseHandle
Sleep
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
InterlockedCompareExchange
EncodePointer
DecodePointer
VirtualFree
wsprintfA
GetSystemMetrics
ChangeDisplaySettingsA
GetLastInputInfo
GetWindowThreadProcessId
RegSetValueExA
RegOpenKeyExA
CloseServiceHandle
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
RegCloseKey
SHGetSpecialFolderPathA
VariantInit
VariantClear
??2@YAPAXI@Z
memcpy
_CxxThrowException
memset
_local_unwind4
strrchr
strstr
??_U@YAPAXI@Z
strncpy
??_V@YAXPAX@Z
free
malloc
printf
rand
atoi
strcspn
wcstombs
realloc
_errno
strchr
_beginthreadex
_except_handler4_common
_unlock
__dllonexit
_lock
_onexit
_malloc_crt
_encoded_null
_initterm
_initterm_e
_amsg_exit
__CppXcptFilter
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
__clean_type_info_names_internal
??3@YAXPAX@Z
ceil
_strupr
_stricmp
__CxxFrameHandler3
_strnicmp
recvfrom
getpeername
accept
listen
htons
getsockname
inet_addr
gethostbyname
closesocket
WSAStartup
connect
WSACleanup
ntohs
inet_ntoa
select
__WSAFDIsSet
recv
send
sendto
socket
bind
GetIfTable
GetAdaptersInfo
DllUpdate
Install
MainThread
ServiceMain
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ