_inject_dll@8
_is_injected@12
_run_script@16
Static task
static1
Behavioral task
behavioral1
Sample
5b634bfaaa6fc85d8fd782c30cd04200_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5b634bfaaa6fc85d8fd782c30cd04200_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
Target
5b634bfaaa6fc85d8fd782c30cd04200_NeikiAnalytics.exe
Size
6.2MB
MD5
5b634bfaaa6fc85d8fd782c30cd04200
SHA1
8d94c61124551093443461e9267ad18568b62902
SHA256
4936de157054a5fbbde8e00e0d4a0f1dd29b6e2715218dddc142762506def024
SHA512
c9dd60d34080a6b3ee09f84b4298fa663ffd1f14c5681b53954f6c28cc857d49806445ed4480dda00b319be46e30fbf64d610a9d97585f3982513570cf368be5
SSDEEP
196608:in1xmGmh3ySCjpRFW7bpvCwZqkaGXUc8zjPb:iIxyZpjW/pvLCPP
Checks for missing Authenticode signature.
resource |
---|
5b634bfaaa6fc85d8fd782c30cd04200_NeikiAnalytics.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
OpenProcess
GetSystemTimeAsFileTime
LocalAlloc
LocalFree
GetModuleFileNameW
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
SetNamedSecurityInfoW
?_Xout_of_range@std@@YAXPBD@Z
__std_exception_destroy
_callnewh
_execute_onexit_table
CharUpperBuffW
_inject_dll@8
_is_injected@12
_run_script@16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ