Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
dc2815c12cc35ffa0940280cf1ad0500_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
dc2815c12cc35ffa0940280cf1ad0500_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Target
dc2815c12cc35ffa0940280cf1ad0500_NeikiAnalytics
Size
1.1MB
MD5
dc2815c12cc35ffa0940280cf1ad0500
SHA1
2f738e36a23314b5fe77bb58f27e184541671b5a
SHA256
9a3bfa8e51029e0a35e6358da5272ff3e9fa02159479c882c07c6cbf7e6797a0
SHA512
4cc1e70166e06a72c17ec33a969972e274a36e399b5077ea3e5f0dae9df2d7a6d888dcc8791cec0125e9f04bd6f4539a8e8c9ea65055cb1770897897bfff7783
SSDEEP
24576:DiFVASO0XA4IjavLy/53F9QqvAErjsU8fU8:eFVpwU45sU8fU8
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Word\word.pdb
timeBeginPeriod
timeEndPeriod
GetProcessMemoryInfo
GetModuleFileNameExW
InitializeSListHead
RtlUnwind
RaiseException
SetLastError
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
SetEnvironmentVariableW
SetCurrentDirectoryW
GetCurrentDirectoryW
ExitProcess
GetModuleHandleExW
GetStdHandle
HeapFree
HeapAlloc
GetFileType
SetFilePointerEx
GetConsoleMode
ReadConsoleW
WideCharToMultiByte
CompareStringW
LCMapStringW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
SetStdHandle
GetStringTypeW
GetFileSizeEx
FlushFileBuffers
GetConsoleCP
HeapSize
HeapReAlloc
SetEndOfFile
DecodePointer
WriteConsoleW
CreatePipe
GetSystemTimeAsFileTime
ReleaseMutex
CreateMutexW
SwitchToThread
ResumeThread
GetProcessTimes
SystemTimeToFileTime
GetLocalTime
FileTimeToSystemTime
MoveFileW
DeleteFileW
GetLogicalDriveStringsW
SetErrorMode
SetFileTime
RemoveDirectoryW
FindFirstFileW
CreateDirectoryW
SetFilePointer
GlobalUnlock
GlobalLock
GlobalAlloc
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
UnhandledExceptionFilter
WriteFile
ReadFile
LocalAlloc
DisconnectNamedPipe
MapViewOfFile
OpenProcess
SetNamedPipeHandleState
ConnectNamedPipe
GetOverlappedResult
CreateNamedPipeW
GetComputerNameW
GetVersionExW
GetExitCodeProcess
CreateProcessW
SetEvent
CreateEventW
WaitForMultipleObjects
TerminateProcess
GetLastError
FormatMessageW
LocalFree
CreateFileMappingW
ProcessIdToSessionId
CreateThread
WaitForSingleObject
GetUserDefaultUILanguage
GetModuleFileNameW
VirtualAlloc
VirtualProtect
GetModuleFileNameA
SetUnhandledExceptionFilter
CloseHandle
GetCurrentThreadId
CreateFileW
GetCurrentProcess
GetModuleHandleW
GetCurrentProcessId
Sleep
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
FindResourceW
LoadResource
LockResource
UnmapViewOfFile
DuplicateHandle
FreeLibrary
GetProcAddress
LoadLibraryW
SetHandleInformation
OpenThread
FreeResource
CloseDesktop
OpenInputDesktop
GetUserObjectInformationW
OpenDesktopW
GetThreadDesktop
SendMessageW
MapWindowPoints
MoveWindow
FindWindowW
ExitWindowsEx
LockWorkStation
CloseWindowStation
EnumDisplayMonitors
ReleaseDC
GetKeyState
VkKeyScanExW
MapVirtualKeyW
GetKeyboardLayout
ToUnicodeEx
UnregisterClassW
SetProcessWindowStation
OpenWindowStationW
GetMessageW
DefWindowProcW
DestroyWindow
CreateWindowExW
DispatchMessageW
IsDialogMessageW
RegisterClassW
TranslateMessage
PostQuitMessage
SetTimer
KillTimer
GetDlgItem
LoadMenuW
PostMessageW
TrackPopupMenu
GetSubMenu
SetMenuDefaultItem
RemoveMenu
RegisterWindowMessageW
SetForegroundWindow
GetCursorPos
LoadIconW
SetThreadDesktop
SystemParametersInfoW
SendInput
GetForegroundWindow
GetSystemMetrics
GetWindowRect
GetWindow
GetWindowThreadProcessId
GetWindowLongW
IsClipboardFormatAvailable
SetClipboardData
GetClipboardData
EmptyClipboard
CloseClipboard
ChangeClipboardChain
OpenClipboard
SetClipboardViewer
PostThreadMessageW
SetWindowsHookExW
UnhookWindowsHookEx
PeekMessageW
WaitMessage
CallNextHookEx
EnumWindows
IsWindowVisible
GetWindowInfo
FindWindowExW
GetClassNameW
GetDC
DrawIconEx
GetCursorInfo
GetIconInfo
EnumDisplayDevicesW
ChangeDisplaySettingsExW
DialogBoxParamW
SetWindowLongW
IsWindow
SetClassLongW
EndDialog
CreateDialogParamW
DestroyIcon
GetWindowTextW
InvalidateRect
SetFocus
ShowWindow
SetWindowTextW
GetClientRect
EnumChildWindows
RegEnumKeyW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
DuplicateToken
ImpersonateLoggedOnUser
RevertToSelf
ImpersonateNamedPipeClient
CopySid
ConvertStringSidToSidW
SetSecurityDescriptorDacl
SetEntriesInAclW
InitializeSecurityDescriptor
SetSecurityInfo
CreateServiceW
CloseServiceHandle
OpenSCManagerW
ChangeServiceConfig2W
DeleteService
ControlService
StartServiceW
OpenServiceW
QueryServiceStatusEx
CreateProcessAsUserW
RegCloseKey
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegCreateKeyW
RegDeleteValueW
RegOpenKeyW
RegQueryValueExW
SetTokenInformation
OpenProcessToken
DuplicateTokenEx
OpenThreadToken
LookupAccountSidW
GetTokenInformation
SetServiceStatus
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
CommandLineToArgvW
Shell_NotifyIconW
SHGetSpecialFolderPathW
ShellExecuteW
ShellExecuteExW
ord680
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
gethostbyname
ntohl
ntohs
gethostname
htonl
__WSAFDIsSet
accept
bind
closesocket
select
shutdown
listen
getpeername
inet_ntoa
ioctlsocket
setsockopt
WSACleanup
WSAGetLastError
WSAStartup
inet_addr
send
socket
connect
recv
htons
getsockname
InitCommonControlsEx
CreateDCW
ExtEscape
GetBitmapBits
GetCurrentObject
BitBlt
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteDC
DeleteObject
GetObjectW
GetDIBits
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ