DllUpdate
Install
MainThread
ServiceMain
Uninstall
Static task
static1
Behavioral task
behavioral1
Sample
06ae2d64d8f367909d97753b2a722b60_NeikiAnalytics.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
06ae2d64d8f367909d97753b2a722b60_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
Target
06ae2d64d8f367909d97753b2a722b60_NeikiAnalytics
Size
51KB
MD5
06ae2d64d8f367909d97753b2a722b60
SHA1
bcf474b06aece36b4f03ae428fdda745f6a7fa0f
SHA256
b326a2b57766525405f0f8045c2f8d33231dab61519c285d0ee9e4706273da67
SHA512
efde633ed44788f5c47351a14ac4b1f4ff51b32427532e0417b23a6e4b4140ddd9dd2b7815f24243b4333a981e6ff5453ec37edd8fd17790db6ef16c820787e8
SSDEEP
768:3Er7XR1M6t6FikUE58ozVOB+6QcXn0cE5Y18BtrEZJjuSkwFOBezdsAMC6Hh4:3EXXM2HEhzVWKtrEZFxFOBWpMC6H
Checks for missing Authenticode signature.
resource |
---|
06ae2d64d8f367909d97753b2a722b60_NeikiAnalytics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FreeLibrary
GetProcAddress
LoadLibraryA
GetTickCount
ReadFile
GetFileAttributesA
LocalFree
LocalSize
LocalAlloc
WinExec
lstrcatA
GetCurrentProcessId
Process32Next
TerminateProcess
OpenProcess
Process32First
CreateToolhelp32Snapshot
CopyFileA
GetModuleFileNameA
GlobalMemoryStatusEx
WaitForSingleObject
GetCurrentDirectoryA
FreeConsole
VirtualProtect
HeapFree
GetProcessHeap
HeapAlloc
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateThread
WritePrivateProfileStringA
GetSystemDirectoryA
GetPrivateProfileStringA
lstrcmpiA
SetEvent
CreateEventA
VirtualAlloc
InterlockedExchange
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
IsProcessorFeaturePresent
lstrcpyA
lstrlenA
GetLastError
GetFileSize
CreateFileA
SetFilePointer
WriteFile
CloseHandle
Sleep
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
InterlockedCompareExchange
EncodePointer
DecodePointer
VirtualFree
wsprintfA
GetSystemMetrics
ChangeDisplaySettingsA
GetLastInputInfo
GetWindowThreadProcessId
RegSetValueExA
RegOpenKeyExA
CloseServiceHandle
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
RegCloseKey
SHGetSpecialFolderPathA
VariantInit
VariantClear
??2@YAPAXI@Z
memcpy
_CxxThrowException
memset
_local_unwind4
strrchr
strstr
??_U@YAPAXI@Z
strncpy
??_V@YAXPAX@Z
free
malloc
printf
rand
atoi
strcspn
wcstombs
realloc
_errno
strchr
_beginthreadex
_except_handler4_common
_unlock
__dllonexit
_lock
_onexit
_malloc_crt
_encoded_null
_initterm
_initterm_e
_amsg_exit
__CppXcptFilter
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
__clean_type_info_names_internal
??3@YAXPAX@Z
ceil
_strupr
_stricmp
__CxxFrameHandler3
_strnicmp
recvfrom
getpeername
accept
listen
htons
getsockname
inet_addr
gethostbyname
closesocket
WSAStartup
connect
WSACleanup
ntohs
inet_ntoa
select
__WSAFDIsSet
recv
send
sendto
socket
bind
GetIfTable
GetAdaptersInfo
DllUpdate
Install
MainThread
ServiceMain
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ