Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
00e04179f3e4d252c4bb162ba859c670_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
00e04179f3e4d252c4bb162ba859c670_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Target
00e04179f3e4d252c4bb162ba859c670_NeikiAnalytics.exe
Size
1.3MB
MD5
00e04179f3e4d252c4bb162ba859c670
SHA1
138b68b9f1e998590f358249f8b3382e2f04c084
SHA256
26184619bb93817d7346437ec52b4ce038b769008ef131f05a15703277b551bf
SHA512
d195fe35220a2076074fc0a934c478960cba5a8ee201418d637fe340ba2205770bb1d4e4adcd7609cffe66ea4c89929f5a6a60abd93e92d285c5ecfc55056eda
SSDEEP
24576:2sZUyLcpq+vCIizFdFpnwG8de2ai3QXVjCcKEO:2/vqFn8de2aFljCcK
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SysReAllocStringLen
SysAllocStringLen
CreateErrorInfo
GetErrorInfo
SetErrorInfo
DispGetIDsOfNames
RegisterTypeLib
LoadTypeLibEx
SysFreeString
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayGetElement
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopyInd
VariantCopy
VariantClear
VariantInit
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
SetSecurityDescriptorDacl
SetFileSecurityW
RegSetValueExW
RegSetKeySecurity
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegNotifyChangeKeyValue
RegGetKeySecurity
RegFlushKey
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
OpenProcessToken
MakeSelfRelativeSD
MakeAbsoluteSD
LookupPrivilegeValueW
LookupPrivilegeNameW
LookupAccountSidW
IsValidSecurityDescriptor
InitializeSecurityDescriptor
InitializeAcl
GetTokenInformation
GetSecurityDescriptorDacl
GetLengthSid
GetFileSecurityW
FreeSid
AllocateAndInitializeSid
AdjustTokenPrivileges
AddAce
SetNamedSecurityInfoW
SetEntriesInAclW
BuildExplicitAccessWithNameW
MessageBoxA
CharNextW
LoadStringW
GetClassLongW
SetWindowLongW
GetWindowLongW
CreateWindowExW
mouse_event
WaitForInputIdle
UnregisterClassW
TranslateMessage
TranslateAcceleratorW
TrackPopupMenu
SystemParametersInfoW
ShowWindow
SetWindowTextW
SetWindowPos
SetTimer
SetPropW
SetMenuItemInfoW
SetMenuInfo
SetMenu
SetForegroundWindow
SetFocus
SetCursor
SendMessageTimeoutW
SendMessageW
ScreenToClient
RemovePropW
RemoveMenu
ReleaseDC
RegisterWindowMessageW
RegisterClassW
RedrawWindow
PostThreadMessageW
PostQuitMessage
PostMessageW
PeekMessageW
OffsetRect
MsgWaitForMultipleObjects
MessageBoxW
LoadStringW
LoadImageW
LoadIconW
LoadCursorW
KillTimer
IsZoomed
IsWindowVisible
IsWindowEnabled
IsWindow
IsIconic
InvalidateRgn
InsertMenuItemW
GetWindowThreadProcessId
GetWindowTextW
GetWindowRect
GetUpdateRgn
GetSystemMetrics
GetSystemMenu
GetSysColor
GetPropW
GetParent
GetMenuItemInfoW
GetMenuItemID
GetMenuInfo
GetKeyState
GetForegroundWindow
GetFocus
GetDesktopWindow
GetDC
GetCursorPos
GetClientRect
GetClassNameW
GetClassInfoW
GetCapture
FindWindowW
FillRect
EnumWindows
EnumChildWindows
EndPaint
EnableWindow
EnableMenuItem
DrawIcon
DispatchMessageW
DestroyWindow
DestroyMenu
DestroyIcon
DestroyAcceleratorTable
DeleteMenu
DefWindowProcW
CreatePopupMenu
CreateMenu
ClientToScreen
CheckRadioButton
CheckMenuRadioItem
CharUpperBuffW
CharUpperW
CharLowerBuffW
CallWindowProcW
BeginPaint
Sleep
VirtualFree
VirtualAlloc
lstrlenW
lstrcpynW
VirtualQuery
QueryPerformanceCounter
GetTickCount
GetSystemInfo
GetVersion
CompareStringW
IsDBCSLeadByteEx
IsValidLocale
SetThreadLocale
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoW
WideCharToMultiByte
MultiByteToWideChar
GetConsoleOutputCP
GetConsoleCP
GetACP
LoadLibraryExW
GetStartupInfoW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetCommandLineW
FreeLibrary
GetLastError
UnhandledExceptionFilter
RtlUnwind
RaiseException
ExitProcess
ExitThread
SwitchToThread
GetCurrentThreadId
CreateThread
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FindFirstFileW
FindClose
WriteFile
SetFilePointer
SetEndOfFile
ReadFile
GetFileType
GetFileSize
CreateFileW
GetStdHandle
CloseHandle
GetProcAddress
RaiseException
LoadLibraryA
GetLastError
TlsSetValue
TlsGetValue
LocalFree
LocalAlloc
GetModuleHandleW
FreeLibrary
lstrcpyW
WritePrivateProfileStringA
WritePrivateProfileStringW
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualQueryEx
VirtualQuery
VirtualFree
VirtualAlloc
UnmapViewOfFile
TerminateProcess
SystemTimeToFileTime
SwitchToThread
SuspendThread
SizeofResource
SetThreadPriority
SetLastError
SetFileTime
SetFilePointer
SetFileAttributesA
SetFileAttributesW
SetEvent
SetErrorMode
SetEndOfFile
SetDllDirectoryW
SearchPathW
ResumeThread
ResetEvent
RemoveDirectoryW
ReleaseMutex
ReadFile
QueryDosDeviceW
OutputDebugStringW
OpenProcess
OpenMutexW
OpenEventW
MulDiv
MoveFileExW
MoveFileW
MapViewOfFile
LockResource
LocalFree
LocalFileTimeToFileTime
LoadResource
LoadLibraryExW
LoadLibraryW
LeaveCriticalSection
IsValidLocale
InitializeCriticalSection
GetWindowsDirectoryW
GetVolumeInformationW
GetVersionExW
GetTimeZoneInformation
GetTickCount
GetThreadPriority
GetThreadLocale
GetTempPathA
GetTempPathW
GetTempFileNameA
GetSystemDirectoryW
GetStdHandle
GetLongPathNameW
GetShortPathNameW
GetProcAddress
GetPrivateProfileStringA
GetPrivateProfileStringW
GetModuleHandleW
GetModuleFileNameW
GetLogicalDriveStringsW
GetLocaleInfoW
GetLocalTime
GetLastError
GetHandleInformation
GetFullPathNameW
GetFileSize
GetFileInformationByHandle
GetFileAttributesW
GetExitCodeThread
GetExitCodeProcess
GetDriveTypeW
GetDiskFreeSpaceW
GetDateFormatW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcess
GetCommandLineW
GetCPInfoExW
GetCPInfo
GetACP
FreeResource
InterlockedIncrement
InterlockedExchangeAdd
InterlockedExchange
InterlockedDecrement
InterlockedCompareExchange
FreeLibrary
FormatMessageW
FlushFileBuffers
FindResourceW
FindNextFileW
FindFirstFileW
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExpandEnvironmentStringsW
ExitProcess
EnumSystemLocalesW
EnumCalendarInfoW
EnterCriticalSection
DosDateTimeToFileTime
DeleteFileA
DeleteFileW
DeleteCriticalSection
CreateProcessW
CreateMutexW
CreateFileMappingW
CreateFileA
CreateFileW
CreateEventW
CreateDirectoryW
CopyFileW
CompareStringW
CloseHandle
Sleep
AlphaBlend
StretchDIBits
StretchBlt
SetTextColor
SetROP2
SetPixel
SetBkMode
SetBkColor
SelectObject
SelectClipRgn
MoveToEx
GetTextExtentPoint32W
GetStockObject
GetPixel
GetObjectW
GetDeviceCaps
ExtTextOutW
DeleteObject
DeleteDC
CreateSolidBrush
CreateRectRgnIndirect
CreateRectRgn
CreateFontIndirectW
CreateFontW
CreateDIBSection
CreateCompatibleDC
CreateCompatibleBitmap
CreateBrushIndirect
CombineRgn
BitBlt
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
CoTaskMemFree
CoCreateGuid
StringFromCLSID
CoCreateInstance
CoLockObjectExternal
CoDisconnectObject
CoRevokeClassObject
CoRegisterClassObject
CoUninitialize
CoInitialize
IsEqualGUID
SHGetFolderPathW
ShellExecuteExW
ShellExecuteW
Shell_NotifyIconW
SHGetPathFromIDListW
SHGetDesktopFolder
InternetSetOptionW
InternetReadFile
InternetOpenW
InternetConnectW
InternetCloseHandle
HttpSendRequestW
HttpQueryInfoW
HttpOpenRequestW
HttpAddRequestHeadersW
InitCommonControls
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ