?rundll@@YGXPAUHWND__@@PAUHINSTANCE__@@PBDH@Z
rundll32
Static task
static1
Behavioral task
behavioral1
Sample
0f3bd9fc4fe0f6564b65e787979672b0_NeikiAnalytics.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0f3bd9fc4fe0f6564b65e787979672b0_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
Target
0f3bd9fc4fe0f6564b65e787979672b0_NeikiAnalytics.exe
Size
3KB
MD5
0f3bd9fc4fe0f6564b65e787979672b0
SHA1
f9420134719f697f2427b3bf4d1099461e92030d
SHA256
71c20d28b9e8f329f48252eefbae45d80734f1e2c33037589b132617109c86b7
SHA512
9e8d450bfa66bcc24459b2e874fb3342d8e1e4ed412ea190dd83334864f427d34a9f447e06599611a3b701a79ac94c9f48d19a5c2e31612063543a5b11cb93f0
Checks for missing Authenticode signature.
resource |
---|
0f3bd9fc4fe0f6564b65e787979672b0_NeikiAnalytics.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
?rundll@@YGXPAUHWND__@@PAUHINSTANCE__@@PBDH@Z
rundll32
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ