_InitAP2@4
_InitAP@0
Static task
static1
Behavioral task
behavioral1
Sample
e3223fd6f30ad1985c6c8159cff143e0_NeikiAnalytics.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e3223fd6f30ad1985c6c8159cff143e0_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
Target
e3223fd6f30ad1985c6c8159cff143e0_NeikiAnalytics
Size
317KB
MD5
e3223fd6f30ad1985c6c8159cff143e0
SHA1
7598224437f17c046e09f5d6dc2e046d80cb371f
SHA256
178332ed77001cd088e6aa63a5453314fb6a1cb4d24b776bb692910e09231aed
SHA512
3d8e90d8b30b031373ff5293a2d04c69398cd76884cf959d5753de333aaabd46412a7f746f63b1b4e940d8c879c80e96cd87cec57d584ae3d1d2df2789bfbffd
SSDEEP
6144:khLtFaUqY5uqMxuAurX2MRPaBhdeAnoSqDr1a9wOZ:2LiG6EAurfRPQdS1DrM9
Checks for missing Authenticode signature.
resource |
---|
e3223fd6f30ad1985c6c8159cff143e0_NeikiAnalytics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DirectInput8Create
SetEvent
InitializeCriticalSection
DeleteCriticalSection
SetThreadContext
GetThreadContext
LoadLibraryA
CreateThread
lstrlenW
SetLastError
MapViewOfFile
IsDebuggerPresent
GetFileAttributesW
GetFileAttributesA
SetFilePointer
GetFullPathNameA
lstrlenA
GetLastError
SetFilePointerEx
GetFileSize
GetFileSizeEx
WaitForSingleObject
CreateEventA
ResumeThread
TerminateProcess
CreateProcessA
CreateProcessW
FindNextFileA
FindFirstFileExA
GetFileAttributesExA
GetTickCount
CopyFileA
CopyFileExA
DeleteFileA
MoveFileA
MoveFileExA
ReplaceFileA
LoadLibraryW
GetModuleHandleW
LoadLibraryExA
LoadLibraryExW
MapViewOfFileEx
FindNextFileW
FindFirstFileW
FindFirstFileExW
GetFileAttributesExW
SetFileAttributesW
CopyFileW
CopyFileExW
DeleteFileW
MoveFileW
MoveFileExW
ReplaceFileW
Module32Next
Module32First
CreateToolhelp32Snapshot
GetCurrentProcessId
DisableThreadLibraryCalls
WaitForMultipleObjects
SetFileAttributesA
InterlockedExchange
EnterCriticalSection
TerminateThread
LeaveCriticalSection
VirtualQuery
UnmapViewOfFile
CreateFileMappingW
CreateFileMappingA
GetCurrentThread
FlushInstructionCache
ExitProcess
SetUnhandledExceptionFilter
OutputDebugStringA
FindFirstFileA
FindClose
GetSystemInfo
VirtualAlloc
VirtualProtect
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
MultiByteToWideChar
WideCharToMultiByte
VirtualFree
GetModuleHandleA
GetProcAddress
GetCurrentProcess
CreateFileA
ReadFile
GetModuleFileNameA
GetCurrentDirectoryA
WriteFile
FreeLibrary
LocalFree
VirtualFreeEx
ReadProcessMemory
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
GetWindowsDirectoryA
InterlockedDecrement
GetVolumeInformationA
DeviceIoControl
HeapFree
HeapAlloc
IsBadReadPtr
CreateDirectoryA
CreateMutexA
ReleaseMutex
InterlockedIncrement
RtlUnwind
RaiseException
GetCurrentThreadId
GetCommandLineA
LCMapStringA
LCMapStringW
GetCPInfo
GetStringTypeA
GetStringTypeW
HeapDestroy
HeapCreate
HeapReAlloc
IsBadWritePtr
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
QueryPerformanceCounter
GetSystemTimeAsFileTime
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
HeapSize
IsBadCodePtr
GetOEMCP
SetStdHandle
FlushFileBuffers
SetEndOfFile
CloseHandle
Sleep
FindWindowA
CharUpperBuffA
MessageBoxA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RevertToSelf
ImpersonateSelf
RegSetValueExA
RegSetKeySecurity
RegCloseKey
GetUserNameA
RegQueryMultipleValuesW
RegQueryMultipleValuesA
RegQueryValueExW
RegQueryValueExA
RegQueryValueW
RegQueryValueA
RegQueryInfoKeyW
RegQueryInfoKeyA
RegOpenKeyExW
RegOpenKeyW
RegOpenKeyA
RegCreateKeyExW
RegCreateKeyExA
RegCreateKeyW
RegCreateKeyA
ShellExecuteExW
ShellExecuteExA
SHGetSpecialFolderPathA
SHGetFolderPathA
SHGetMalloc
ShellExecuteA
ShellExecuteW
SHGetPathFromIDListA
SHGetDesktopFolder
GetAdaptersInfo
CoInitializeEx
CoInitializeSecurity
CoUninitialize
CoCreateGuid
CoCreateInstance
CoSetProxyBlanket
SysFreeString
VariantInit
VariantChangeType
VariantClear
SysAllocString
_InitAP2@4
_InitAP@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ