_MainWndProc@16
_StubFileWrite@12
Static task
static1
Behavioral task
behavioral1
Sample
0c56d16c04a6b04c9b555ccfff0235584d15fd565cb5368f6f3868566c110f76_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0c56d16c04a6b04c9b555ccfff0235584d15fd565cb5368f6f3868566c110f76_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Target
0c56d16c04a6b04c9b555ccfff0235584d15fd565cb5368f6f3868566c110f76_NeikiAnalytics
Size
5.8MB
MD5
ed27f4334067414786e60087891f8110
SHA1
916c546a89dfcec7d93275cbd52e7aa9e6d843e8
SHA256
0c56d16c04a6b04c9b555ccfff0235584d15fd565cb5368f6f3868566c110f76
SHA512
440b02dc5843d1c35f72fcd6c568431aa92411cbd09eccd725b50ec0956d8fc2b01f0dd2b98ba002241425553dd578cb7df05c0d4c187124c28a7927f5c1e301
SSDEEP
98304:42ER0m3pqXk+UzmiN3IqoSVYyyZTZcDSDyyZTZcK90bIh+1khM9p6WKG0CDXOB0+:42M0mA0+imiW4VzoZOopeQBMpAG0CQ0+
Checks for missing Authenticode signature.
resource |
---|
0c56d16c04a6b04c9b555ccfff0235584d15fd565cb5368f6f3868566c110f76_NeikiAnalytics |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
FreeLibrary
OpenFile
LoadLibraryA
_lclose
_lopen
lstrcpyA
_lcreat
GetModuleFileNameA
GetVersionExA
SetErrorMode
lstrlenA
GetWindowsDirectoryA
GlobalHandle
_lwrite
WinExec
GlobalAlloc
GlobalFree
ExitProcess
_lread
_llseek
GlobalUnlock
GetCommandLineA
GetModuleHandleA
GlobalLock
GetClientRect
DefWindowProcA
SendMessageA
EndPaint
BeginPaint
InvalidateRect
PostQuitMessage
wsprintfA
CreateWindowExA
GetDC
ReleaseDC
SetWindowPos
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
ExitWindowsEx
MessageBoxA
RegisterClassA
CreatePalette
DeleteObject
GetStockObject
GetDeviceCaps
PatBlt
CreateSolidBrush
SelectObject
SelectPalette
RealizePalette
_MainWndProc@16
_StubFileWrite@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ