?rundll@@YGXPAUHWND__@@PAUHINSTANCE__@@PBDH@Z
rundll32
Static task
static1
Behavioral task
behavioral1
Sample
d1a971bc4ca57e35261ef6e9e46887a0_NeikiAnalytics.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d1a971bc4ca57e35261ef6e9e46887a0_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
Target
d1a971bc4ca57e35261ef6e9e46887a0_NeikiAnalytics.exe
Size
3KB
MD5
d1a971bc4ca57e35261ef6e9e46887a0
SHA1
a3ad544ac56c73999d06429f70c60e694577ca4e
SHA256
d8ea452c819fad1eb4c23b4f762bb37cd9c996afd1c501a0fb6356317442df46
SHA512
e851f8a9dd6cdf6ba6951027c25028e5788450fcc762b1b44da9fb339542c79626c71b8620413b7eec6a5da389bb0c6f68b037caffb924263b63bb8af85ebb89
Checks for missing Authenticode signature.
Processes:
resource |
---|
d1a971bc4ca57e35261ef6e9e46887a0_NeikiAnalytics.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
?rundll@@YGXPAUHWND__@@PAUHINSTANCE__@@PBDH@Z
rundll32
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ