Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
319a3c5172a708820b2e3c20dd734e50_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
319a3c5172a708820b2e3c20dd734e50_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Target
319a3c5172a708820b2e3c20dd734e50_NeikiAnalytics.exe
Size
5.0MB
MD5
319a3c5172a708820b2e3c20dd734e50
SHA1
b9f2164a867535b56bb4d570501e2cc3c9306720
SHA256
60efadec9b8a65fd1a16b601ff5af0bc873efebcff6793eafad3e4b171baa7cc
SHA512
0bfd0b29481b6148b35e990457eef82d6b7a61b2276bf02ef2dead9c19a58669fe71202bd41c2bf8112b12a640612aea98bd2e14477a4752937a3890cd26d988
SSDEEP
98304:QqihTvjtEh2N5LQhyddG4THBZoJG3QGMxvbze/bsTwY2hl:kpvE8dgq3oJG3QGMx/lWl
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
F:\Office\Target\x86\ship\click2run\en-us\AdminBootstrapper.pdb
RegCreateKeyExW
RegCloseKey
CryptReleaseContext
CryptAcquireContextW
EventWriteTransfer
EventRegister
EventUnregister
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegEnumValueW
RegDeleteTreeW
RegDeleteKeyW
RegGetValueW
RegSetValueExW
RegDeleteValueW
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
FreeSid
EqualSid
CreateWellKnownSid
IsValidSid
GetSidSubAuthorityCount
GetSidSubAuthority
RevertToSelf
OpenThreadToken
ConvertStringSecurityDescriptorToSecurityDescriptorW
OpenSCManagerW
CloseServiceHandle
OpenServiceW
QueryServiceStatusEx
QueryServiceConfigW
StartServiceW
ControlService
EnumDependentServicesW
DeleteService
CreateServiceW
ChangeServiceConfig2W
ChangeServiceConfigW
SetServiceObjectSecurity
GetLengthSid
InitializeAcl
AddAccessAllowedAce
CopySid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetSecurityDescriptorDacl
ConvertSidToStringSidA
CheckTokenMembership
LookupPrivilegeValueW
AdjustTokenPrivileges
CryptDestroyHash
CryptGetHashParam
CryptCreateHash
CryptHashData
RegNotifyChangeKeyValue
EventWrite
RegEnumValueA
RegDeleteValueA
RegSetKeySecurity
SetFileAttributesW
GetFileAttributesExW
GetDiskFreeSpaceExW
DeleteFileW
CloseHandle
GetCurrentDirectoryW
GetWindowsDirectoryW
GetProcAddress
SetFilePointerEx
MoveFileExW
CopyFileW
AreFileApisANSI
WideCharToMultiByte
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
Sleep
GetStringTypeExW
GetUserDefaultLCID
LoadLibraryA
LCMapStringW
FreeLibrary
LocalFree
FormatMessageA
GetTickCount64
GetCurrentThreadId
TlsAlloc
TlsFree
FlsGetValue
TlsGetValue
FlsSetValue
TlsSetValue
GetModuleHandleExW
K32GetProcessMemoryInfo
GlobalMemoryStatusEx
LeaveCriticalSection
EnterCriticalSection
RaiseException
GetModuleHandleW
LoadLibraryExW
VerSetConditionMask
VerifyVersionInfoW
GetVersionExW
GetStringTypeW
InitializeSRWLock
ReleaseSRWLockShared
AcquireSRWLockShared
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
OpenProcess
GetCurrentProcessId
TerminateProcess
GetModuleFileNameA
GetShortPathNameA
K32GetModuleFileNameExW
CreateProcessW
FindResourceW
SizeofResource
LoadResource
GetCPInfoExW
GetUserDefaultLocaleName
IsValidCodePage
SetLastError
GetSystemTime
SystemTimeToFileTime
FileTimeToSystemTime
SetErrorMode
GetComputerNameW
MulDiv
FormatMessageW
GetLogicalProcessorInformation
GetNativeSystemInfo
GetSystemDirectoryW
CreateEventW
SetEvent
WaitForSingleObject
ReleaseSemaphore
WaitForSingleObjectEx
CreateEventExW
CreateThread
WaitForMultipleObjectsEx
CloseThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CreateThreadpoolTimer
CloseThreadpoolWait
SetThreadpoolWait
WaitForThreadpoolWaitCallbacks
CreateThreadpoolWait
CreateThreadpoolWork
SubmitThreadpoolWork
LoadLibraryW
OutputDebugStringA
RtlCaptureStackBackTrace
QueryDepthSList
FindClose
InitializeSListHead
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseMutex
SystemTimeToTzSpecificLocalTime
TzSpecificLocalTimeToSystemTime
GetTempPathW
GetLongPathNameW
ExpandEnvironmentStringsW
GetCommandLineW
GlobalFree
ProcessIdToSessionId
GetExitCodeThread
WaitForMultipleObjects
SignalObjectAndWait
GetProcessAffinityMask
CreateWaitableTimerW
SetWaitableTimerEx
CancelWaitableTimer
HeapFree
GetProcessHeap
ReadFile
GetFileSizeEx
GetTempFileNameW
WriteFile
GetTickCount
SetEndOfFile
GetThreadLocale
FindFirstFileExW
lstrcmpW
GetModuleHandleA
GetFileType
GetOverlappedResult
SetFileInformationByHandle
GetFileInformationByHandleEx
GetDriveTypeW
CreateMutexW
OpenEventA
CreateEventA
OpenMutexA
CreateMutexA
OpenSemaphoreA
CreateSemaphoreA
OpenFileMappingA
LocalAlloc
HeapAlloc
GlobalAlloc
GetPriorityClass
GetExitCodeProcess
K32EnumProcesses
GetTimeZoneInformation
IsValidLocale
VirtualProtectEx
GetSystemInfo
ResetEvent
LockResource
FlushFileBuffers
CancelIoEx
IsProcessorFeaturePresent
WerRegisterMemoryBlock
WerUnregisterMemoryBlock
QueryFullProcessImageNameW
CreateIoCompletionPort
PostQueuedCompletionStatus
GetThreadIOPendingFlag
GetQueuedCompletionStatus
IsDebuggerPresent
CreateMemoryResourceNotification
GetSystemPowerStatus
IsSystemResumeAutomatic
QueryUnbiasedInterruptTime
OutputDebugStringW
VirtualFree
VirtualAlloc
GetLocaleInfoEx
LCIDToLocaleName
GetLocaleInfoW
ResolveLocaleName
GetUserPreferredUILanguages
GetACP
LocaleNameToLCID
GetSystemDefaultLCID
LCMapStringEx
EnumSystemLocalesEx
GetSystemDefaultLocaleName
GetUserGeoID
GetProductInfo
SwitchToThread
GetEnvironmentVariableW
RemoveDirectoryW
DeviceIoControl
FindNextFileW
GetFullPathNameW
FindFirstFileW
CreateDirectoryW
GetThreadTimes
GetCurrentThread
GetProcessTimes
QueryPerformanceCounter
LoadLibraryExA
VirtualQuery
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
SetStdHandle
EnumSystemLocalesW
ExitProcess
HeapReAlloc
HeapSize
GetConsoleCP
ReadConsoleW
GetConsoleMode
UnregisterWaitEx
VirtualProtect
FreeLibraryAndExitThread
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetNumaHighestNodeNumber
ChangeTimerQueueTimer
GetThreadPriority
GetSystemTimeAsFileTime
QueryPerformanceFrequency
MultiByteToWideChar
GetModuleFileNameW
IsWow64Process
SetThreadPriority
CreateTimerQueue
InterlockedFlushSList
RtlUnwind
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CompareStringW
GetCPInfo
InitializeCriticalSectionAndSpinCount
EncodePointer
DuplicateHandle
K32GetProcessImageFileNameW
GetSystemPreferredUILanguages
GetDateFormatW
GetTimeFormatW
GetFileAttributesW
CreateFileW
FlsAlloc
FlsFree
DeleteCriticalSection
CompareStringEx
GetLastError
InitializeCriticalSectionEx
GetCurrentProcess
DeleteTimerQueueTimer
CreateTimerQueueTimer
OpenThread
lstrcmpA
FreeConsole
WriteConsoleW
GetStdHandle
AllocConsole
AttachConsole
DecodePointer
TryEnterCriticalSection
GetLocalTime
CoRevokeInitializeSpy
CoRegisterInitializeSpy
CreateStreamOnHGlobal
CoTaskMemAlloc
IIDFromString
CLSIDFromString
CoTaskMemFree
CoCreateInstance
CoSetProxyBlanket
CoCreateFreeThreadedMarshaler
StringFromGUID2
CoCreateGuid
CoUninitialize
CoInitializeEx
VariantInit
VariantClear
SysFreeString
SysAllocString
ord13
ord14
WTHelperProvDataFromStateData
WinVerifyTrust
WTHelperGetProvSignerFromChain
SetupIterateCabinetW
WSAStartup
FreeAddrInfoW
GetAddrInfoW
CreateSortedAddressPairs
FreeMibTable
GetDeviceCaps
CreateSolidBrush
SetTextColor
SetBkColor
GetStockObject
CreateFontW
SelectObject
GetTextMetricsW
CreatePen
SetDCPenColor
Rectangle
GetTextExtentPoint32W
SetDCBrushColor
DeleteObject
GdipDeleteGraphics
GdipCreateFromHDC
GdipDrawImageRectRectI
GdiplusStartup
GdipDrawImageRectI
GdipFree
GdipDisposeImage
GdipAlloc
GdipCloneImage
GdipLoadImageFromStream
GdipGetImageHeight
GdipFillRectangleI
GdipCloneBrush
GdipDeleteBrush
GdipCreateBitmapFromScan0
GdipGetImageWidth
GdipGetImageGraphicsContext
GdipCreateSolidFill
RpcStringFreeW
UuidToStringW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ