__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
0470807ca44a272746482ee116ff7c321b2eb6dd6d5e6881c4167f776350dbf1_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0470807ca44a272746482ee116ff7c321b2eb6dd6d5e6881c4167f776350dbf1_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Target
0470807ca44a272746482ee116ff7c321b2eb6dd6d5e6881c4167f776350dbf1_NeikiAnalytics
Size
79KB
MD5
2b82e4a2e7a88df0b367480f011f1830
SHA1
6ee0c3bdf97574f563d40de468a029a917fc640a
SHA256
0470807ca44a272746482ee116ff7c321b2eb6dd6d5e6881c4167f776350dbf1
SHA512
812c7e668a745d9ac5f06f0e69e02635aaf5c4b21cc3a25db3e3cb82936680718aced2cc9e289742d23ed371f25eeb4ce938b63c447d34fe8ddf4db7d26d1120
SSDEEP
1536:zvEzb99PNHUFOQA8AkqUhMb2nuy5wgIP0CSJ+5yyB8GMGlZ5G:zvEPPNHUcGdqU7uy5w9WMyyN5G
Checks for missing Authenticode signature.
resource |
---|
0470807ca44a272746482ee116ff7c321b2eb6dd6d5e6881c4167f776350dbf1_NeikiAnalytics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CreateFileA
CreateProcessA
DeleteFileA
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
GetACP
GetCPInfo
GetCommandLineA
GetCurrentDirectoryA
GetCurrentThreadId
GetDriveTypeA
GetEnvironmentStrings
GetExitCodeProcess
GetFileAttributesA
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetShortPathNameA
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetTickCount
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
LCMapStringA
LoadLibraryA
MultiByteToWideChar
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WaitForSingleObject
WideCharToMultiByte
WriteFile
EnumThreadWindows
MessageBoxA
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ