GetDLlVersion
Prevx1
Run
Static task
static1
Behavioral task
behavioral1
Sample
1469f7a0c19d0c1d10c1b73cc8b13040_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1469f7a0c19d0c1d10c1b73cc8b13040_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
Target
1469f7a0c19d0c1d10c1b73cc8b13040_NeikiAnalytics
Size
76KB
MD5
1469f7a0c19d0c1d10c1b73cc8b13040
SHA1
3376ec1ae4f8ee00ce7b9c9f706ee0034b809e31
SHA256
bd85db45c1e55922527666a2d3a34ac32caea125995554998bb83f2a8b90d8e9
SHA512
1e94ed106c2bf8a614d0b67ff33daacc4b0858c298bd1dafc86c81e2a2ffdc18efb5fbd0ec6dfdf71d7e51cf2978c9268af6fbbb54c464796fa7a56a7f5c32c1
SSDEEP
768:DHPF9c2tgipe3Un+afZIx0H1wyoTVmdHBwmTdW1URWTCiB9VbU5FLVZ5bbs:TPbTgP2Q0H1roTVIBwmTdWyWs5s
Checks for missing Authenticode signature.
resource |
---|
1469f7a0c19d0c1d10c1b73cc8b13040_NeikiAnalytics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DeleteFileA
TerminateProcess
GetLastError
FindClose
FindNextFileA
FindFirstFileA
GetModuleFileNameA
CompareStringW
CompareStringA
LCMapStringW
LCMapStringA
CreateProcessA
SetEnvironmentVariableA
Sleep
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
FlushFileBuffers
SetStdHandle
InterlockedIncrement
InterlockedDecrement
SetFilePointer
GetEnvironmentStringsW
HeapFree
HeapAlloc
HeapReAlloc
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetCommandLineA
GetVersion
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
RtlUnwind
CloseHandle
WriteFile
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetProcAddress
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
SendMessageA
GetWindowThreadProcessId
GetClassNameA
GetParent
CloseDesktop
SetForegroundWindow
EnumDesktopWindows
PostMessageA
CreateDesktopA
OpenDesktopA
EnumChildWindows
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
SHGetSpecialFolderPathA
WSACleanup
gethostbyname
WSAStartup
connect
setsockopt
socket
htons
send
recv
closesocket
shutdown
inet_addr
GetDLlVersion
Prevx1
Run
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ