@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
66c170135ec702a3acabfe15b15d1ca0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
66c170135ec702a3acabfe15b15d1ca0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
Target
66c170135ec702a3acabfe15b15d1ca0_NeikiAnalytics
Size
519KB
MD5
66c170135ec702a3acabfe15b15d1ca0
SHA1
df7e6575102af853c592baf8b53b71d9aa25324c
SHA256
2fbe9637e9e47d91f3fd7a7c55fe43be9f9e5c1aa4265d3799f76818bfeb5eb0
SHA512
7d6e15e58b44bb89a8592c1f6067ff74c68db28c822fb7e2763b8816d9740d9460b9a2078e12ee37e31e60517717c573da83d1bd1ff6291b300f33912109a171
SSDEEP
6144:Q6oZ4SQ60wb+2voVxIpr4IPFjdnhd3C0kYdERcSD8YjNrdrBA0m85fSh7fojxEhX:Q6dt6nb+24aT/Yj5O7fojxEhH0cZGi
Checks for missing Authenticode signature.
resource |
---|
66c170135ec702a3acabfe15b15d1ca0_NeikiAnalytics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
CloseHandle
CopyFileA
CreateDirectoryA
CreateFileA
CreateProcessA
CreateThread
DeleteFileA
DeleteFileW
EnterCriticalSection
ExitProcess
ExitThread
FileTimeToDosDateTime
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentDirectoryA
GetCurrentThreadId
GetDateFormatA
GetDriveTypeA
GetEnvironmentStrings
GetEnvironmentVariableA
GetExitCodeProcess
GetFileAttributesA
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetShortPathNameA
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetSystemTime
GetTimeZoneInformation
GetVersion
GetVersionExA
GetVolumeInformationA
GlobalAlloc
GlobalFree
GlobalLock
GlobalMemoryStatus
GlobalSize
GlobalUnlock
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
MoveFileA
MoveFileExA
MultiByteToWideChar
OpenFile
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetCurrentDirectoryA
SetEnvironmentVariableA
SetFileAttributesA
SetFilePointer
SetFileTime
SetHandleCount
Sleep
SystemTimeToFileTime
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WinExec
WriteFile
_hread
_hwrite
_lclose
_llseek
_lopen
lstrlenA
ChooseColorA
GetOpenFileNameA
PrintDlgA
GetSaveFileNameA
BitBlt
CreateCompatibleDC
CreateDIBitmap
CreateFontA
CreateFontIndirectA
CreatePen
CreateSolidBrush
DeleteDC
DeleteObject
EndDoc
EndPage
GetDIBits
GetDeviceCaps
GetObjectA
GetPixel
GetStockObject
GetTextExtentPoint32A
GetTextExtentPointA
GetTextMetricsA
MoveToEx
Rectangle
SelectObject
SetBkColor
SetBkMode
SetBrushOrgEx
SetStretchBltMode
SetTextAlign
SetTextColor
StartDocA
StartPage
StretchBlt
StretchDIBits
TextOutA
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
BeginPaint
CallWindowProcA
CheckDlgButton
CheckMenuItem
CheckRadioButton
CloseClipboard
CountClipboardFormats
CreateDialogParamA
CreateWindowExA
DefWindowProcA
DeleteMenu
DestroyWindow
DialogBoxParamA
DispatchMessageA
DrawTextA
EmptyClipboard
EnableMenuItem
EnableWindow
EndDialog
EndPaint
EnumClipboardFormats
EnumThreadWindows
FillRect
FindWindowA
GetCaretPos
GetClientRect
GetClipboardData
GetClipboardFormatNameA
GetDC
GetDlgItem
GetDlgItemInt
GetDlgItemTextA
GetFocus
GetKeyState
GetMenu
GetMenuStringA
GetMessageA
GetMessagePos
GetSysColor
GetSystemMetrics
GetWindowRect
GetWindowTextA
InsertMenuA
InvalidateRect
IsDialogMessageA
IsDlgButtonChecked
KillTimer
LoadBitmapA
LoadCursorA
LoadIconA
MessageBeep
MessageBoxA
MoveWindow
OffsetRect
OpenClipboard
PostMessageA
PostQuitMessage
PtInRect
RegisterClassA
RegisterClassExA
RegisterClipboardFormatA
ReleaseDC
ScrollWindow
SendDlgItemMessageA
SendMessageA
SetClipboardData
SetCursor
SetDlgItemInt
SetDlgItemTextA
SetFocus
SetForegroundWindow
SetRect
SetScrollInfo
SetScrollPos
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
TranslateMessage
UnregisterClassA
UpdateWindow
VkKeyScanA
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ