Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
e6cafb4136a9438227086a5826eafe10_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e6cafb4136a9438227086a5826eafe10_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
Target
e6cafb4136a9438227086a5826eafe10_NeikiAnalytics.exe
Size
1.8MB
MD5
e6cafb4136a9438227086a5826eafe10
SHA1
eca90b1ba31b466fa62b81f3337ad45ea0774fea
SHA256
17ff585fadcf40e25ad9d09cf007d20f6691ccf31d93a5d48d25f7e811cb0ca4
SHA512
680287aa619415a451bdd37756a235390d1114ab80446a8ad1ea56849ddc9cc38ef6c1660faf39d1b2715511d80f117da948b24f221d70e03daf2884ad3509a9
SSDEEP
24576:tEHdQz6xQA5evhTnYjeVF3y+v9n73PvexRCJxyvYe9kEK6Ft56NO:mHyz6xV5evh7YjeV1tJgQ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetLastError
CloseHandle
RaiseException
DecodePointer
DeleteCriticalSection
GetModuleFileNameA
GetCurrentProcess
lstrlenW
WriteFile
OutputDebugStringA
CreateMutexW
GetCurrentThreadId
Sleep
GetTempPathA
CreateFileA
DeleteFileA
ExitProcess
WinExec
SetEndOfFile
WriteConsoleW
CreateFileW
SetStdHandle
GetProcessHeap
FindClose
InitializeCriticalSectionEx
EnumSystemLocalesA
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
HeapSize
HeapReAlloc
ReadConsoleW
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
HeapFree
HeapAlloc
GetFileType
SetFilePointerEx
GetFileSizeEx
GetCommandLineW
GetCommandLineA
RtlUnwind
GetStdHandle
GetModuleFileNameW
GetModuleHandleExW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
EncodePointer
MultiByteToWideChar
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
LocalFree
IsDebuggerPresent
OutputDebugStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
InitializeSListHead
TerminateProcess
RtlUnwindEx
RtlPcToFileHeader
FreeLibrary
LoadLibraryExW
MessageBoxA
RegDeleteValueA
RegCloseKey
RegOpenKeyExW
RegSetValueExA
ord680
FindExecutableA
VariantClear
UuidFromStringA
RtlCaptureContext
RtlIpv4StringToAddressA
RtlLookupFunctionEntry
RtlEthernetStringToAddressA
RtlVirtualUnwind
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ