Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
d7ff5ef9c833a2e5b2f26e83ee8982a0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d7ff5ef9c833a2e5b2f26e83ee8982a0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Target
d7ff5ef9c833a2e5b2f26e83ee8982a0_NeikiAnalytics
Size
240KB
MD5
d7ff5ef9c833a2e5b2f26e83ee8982a0
SHA1
7c138aed7f019190881d5f3c5535152e9723f467
SHA256
05820f6d6253f160c64b90a8af6d06cb9c4c95f76c27d1faf85bd94cbb1963b0
SHA512
6f75791731805ec3b038a90b671a799f28fe99678620f757aa277c26d8cd72c14964e3c22133e7496cb2dbb49592fc1d0627258278d23eea0a05c9400d92e9c5
SSDEEP
6144:VuOYYecObhLvkiL2XOdldJNifl4wwXCAjVrUEzvbeTIu//:wK1y9hrTiN4nBRrUS6Tf/
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CreatePipe
GlobalGetAtomNameA
RaiseException
GetSystemDefaultLangID
lstrcmpA
lstrcpy
GetModuleFileNameW
lstrlenW
GetLogicalDrives
GetNumberFormatW
GetCurrentDirectoryA
DosDateTimeToFileTime
GetTempFileNameA
GetWindowsDirectoryA
ExitThread
GetSystemDirectoryW
GetSystemInfo
SetEvent
GetDateFormatA
GetFileTime
GetMailslotInfo
VirtualAlloc
GetNamedPipeInfo
ExpandEnvironmentStringsA
GlobalFindAtomW
GlobalAlloc
FindResourceA
GetCurrentDirectoryW
DeleteAtom
GetLocaleInfoW
GetDateFormatW
LoadLibraryA
MoveFileA
GetMenuItemInfoW
CreateDesktopA
GetParent
LoadMenuW
CreateDialogParamA
GetDlgItemTextA
DialogBoxIndirectParamA
GetFocus
CreateDialogIndirectParamA
GetWindowTextA
GetMenuItemRect
GetClassInfoExA
CascadeWindows
GetMessageA
WaitForInputIdle
PeekMessageA
CharNextW
UpdateWindow
GetWindowRect
GetCapture
GetFontData
CreateCompatibleBitmap
SetPixel
EnumFontFamiliesW
UpdateICMRegKeyW
GetCharWidthW
GetTextExtentExPointI
GetTextCharacterExtra
GetMapMode
GetTextAlign
RegOpenKeyExW
RegSaveKeyA
RegDeleteValueA
RegQueryValueA
RegQueryInfoKeyA
RegQueryValueW
SHBrowseForFolder
SHFreeNameMappings
StrNCmpIA
StrChrA
StrRStrIA
SetupSetPlatformPathOverrideW
SetupSetDirectoryIdExA
CertAddEncodedCRLToStore
CryptSIPCreateIndirectData
CryptGetDefaultOIDDllList
CertDeleteCRLFromStore
CertAddCertificateContextToStore
CertUnregisterPhysicalStore
I_CertSrvProtectFunction
I_CryptInstallAsn1Module
I_CryptFlushLruCache
CertSetCertificateContextProperty
RegOpenKeyExU
RegDeleteValueU
CertVerifyCTLUsage
CertFindCTLInStore
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ