DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
400cbf53d75de1ce891caafc63e43be0_NeikiAnalytics.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
400cbf53d75de1ce891caafc63e43be0_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
Target
400cbf53d75de1ce891caafc63e43be0_NeikiAnalytics.exe
Size
75KB
MD5
400cbf53d75de1ce891caafc63e43be0
SHA1
5d7a0f7294a3ee130a6ed47063f595efccd64d49
SHA256
978f28ed4a18b95923aa1deebadfef21da46d873b958ff30dd0f54a92853f7d8
SHA512
dfa8b2be192e29ca6ed4fe78173e08830ad3d4766cd4bb4b1c01c6a06b012ff55a15171ddc51e6ae46aefc3bf85bd2fb7816a039e10ecf9b0096611f479a7ef2
SSDEEP
1536:H2wbRPDGDJKktJWnZy8nuGfH9XAxB0PBVVya5QqnrVVbjXucwlWnZnSwXQT:vbRiJZtCuSBAxqBaa5Qq/b2uxS60
Checks for missing Authenticode signature.
resource |
---|
400cbf53d75de1ce891caafc63e43be0_NeikiAnalytics.exe |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LocalAlloc
GetLastError
GetCurrentProcess
GetTempPathW
FindClose
FindFirstFileW
Process32NextW
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
Process32FirstW
GetCurrentProcessId
GetVolumeInformationW
GetSystemDirectoryW
WideCharToMultiByte
CreateEventA
OpenEventA
GetVersionExW
LocalFree
CreateDirectoryW
DeleteFileW
CopyFileW
FindNextFileW
SetCurrentDirectoryW
GetCurrentDirectoryW
LoadLibraryW
GetTickCount
IsDebuggerPresent
CreateMutexA
CreateFileMappingA
MoveFileExW
GetTempPathA
CreateFileA
CreateThread
SetErrorMode
GetTimeZoneInformation
WTSGetActiveConsoleSessionId
GetVersion
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
GetComputerNameA
GetComputerNameW
Sleep
CreateFileMappingW
lstrcmpA
LoadLibraryA
MapViewOfFile
UnmapViewOfFile
HeapAlloc
ReleaseMutex
ReadFile
CreateFileW
WriteFile
GetFileSize
WaitForSingleObject
CreateProcessW
CloseHandle
GetSystemTimeAsFileTime
VirtualQuery
HeapFree
HeapSize
HeapReAlloc
GetProcessHeap
VirtualProtect
GetMessageW
EnumChildWindows
GetWindowThreadProcessId
DispatchMessageW
TranslateMessage
GetClassNameA
EnumWindows
SendMessageA
FindWindowW
SetWinEventHook
DefWindowProcW
GetWindowLongW
CreateWindowExW
GetSystemMetrics
SetParent
SetWindowLongW
PeekMessageW
RegisterClassExW
CryptReleaseContext
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptAcquireContextA
CryptGenRandom
GetTokenInformation
DuplicateTokenEx
CreateProcessAsUserW
GetUserNameW
GetSecurityDescriptorSacl
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSidSubAuthority
GetSidSubAuthorityCount
OpenProcessToken
RegCloseKey
RegQueryValueExA
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegEnumKeyExW
RegEnumKeyA
CryptDestroyKey
CryptVerifySignatureW
RegOpenKeyA
RegDeleteValueW
CryptEncrypt
ShellExecuteExW
SHGetFolderPathW
CoInitialize
CoUninitialize
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
CLSIDFromString
CoCreateInstance
SysFreeString
SysStringLen
VariantInit
SysAllocString
VariantClear
SysAllocStringLen
wvnsprintfA
wvnsprintfW
PathFindFileNameW
UuidCreate
EnumDeviceDrivers
GetDeviceDriverBaseNameW
CreateEnvironmentBlock
DestroyEnvironmentBlock
WTSQueryUserToken
recv
setsockopt
WSAStartup
htons
ntohs
recvfrom
sendto
socket
gethostbyname
closesocket
ioctlsocket
__WSAFDIsSet
select
send
connect
ObtainUserAgentString
CryptImportPublicKeyInfo
CryptDecodeObjectEx
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ