c57ulf
qa4e8r
vlr3db
xlshd4
xoq4ih
Static task
static1
Behavioral task
behavioral1
Sample
5a56feb73a8c535ddfb20569563b52a0_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5a56feb73a8c535ddfb20569563b52a0_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
Target
5a56feb73a8c535ddfb20569563b52a0_NeikiAnalytics.exe
Size
443KB
MD5
5a56feb73a8c535ddfb20569563b52a0
SHA1
f9418b5209944ee67c6928a0c52ccac5166cf266
SHA256
cc7969d0e9d37f359cced3ccb21dfc5fae276a0edd2d151bc48e2f1b75621068
SHA512
10d9c655cfab04ff9e1a2560171a28cae1cf18f5cd9e2ed0d25a1c297d51e7ff493279ab5290ce97e07bff17508f2d74ac664fa5e5287528e3c0c3d298510a9e
SSDEEP
6144:m7496kLLsdmuf4XDtlzCOLb1KMdEUpeWGV696fV4/D0XPvpim:tDLLUmkutlzCSbHdEEeWGm6drQm
Checks for missing Authenticode signature.
resource |
---|
5a56feb73a8c535ddfb20569563b52a0_NeikiAnalytics.exe |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Wow64EnableWow64FsRedirection
GetFileInformationByHandle
CloseHandle
AllocateUserPhysicalPagesNuma
AddAtomA
K32EnumProcesses
AddSIDToBoundaryDescriptor
NeedCurrentDirectoryForExePathA
OpenSemaphoreA
TlsGetValue
BackupSeek
K32GetWsChanges
GetNLSVersion
GetCurrentProcess
GetCurrentThreadId
GetCurrentProcessId
CreateThread
K32EmptyWorkingSet
GetProcessIdOfThread
SetConsoleActiveScreenBuffer
HeapCreate
GetProcAddress
LoadLibraryA
K32GetPerformanceInfo
GetModuleHandleA
WaitForSingleObjectEx
OutputDebugStringW
OutputDebugStringA
CreateFileW
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
TerminateProcess
RtlUnwind
RaiseException
InterlockedPushEntrySList
InterlockedFlushSList
GetLastError
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
HeapAlloc
HeapFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetFileType
FlushFileBuffers
WriteFile
GetConsoleCP
GetConsoleMode
GetCurrentThread
GetACP
GetStringTypeW
FindClose
FindFirstFileExA
FindFirstFileExW
FindNextFileA
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
GetProcessHeap
SetConsoleCtrlHandler
SetStdHandle
SetFilePointerEx
WriteConsoleW
DecodePointer
RegQueryValueExA
RegReplaceKeyW
ReadEventLogW
AccessCheckByTypeResultListAndAuditAlarmByHandleA
RegRestoreKeyW
SetSecurityDescriptorControl
CloseServiceHandle
PowerReadSettingAttributes
PowerReplaceDefaultPowerSchemes
SetActivePwrScheme
ValidatePowerPolicies
PowerEnumerate
c57ulf
qa4e8r
vlr3db
xlshd4
xoq4ih
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ