Exec
ExecToLog
ExecToStack
Static task
static1
Behavioral task
behavioral1
Sample
6ef25e02286d0255ba2ab615bb9e4d40_NeikiAnalytics.dll
Resource
win7-20240221-en
Target
6ef25e02286d0255ba2ab615bb9e4d40_NeikiAnalytics.exe
Size
236KB
MD5
6ef25e02286d0255ba2ab615bb9e4d40
SHA1
492baf9eccafaacf704267692023d7d9c09e6533
SHA256
2f575cb02042b75ad73c2c15657fd0a421b8c0369b5dd5c8e0346b9daf2e28e5
SHA512
14efb6f5f5dd23ec437f4946b0764be27e4b975c455330463781e4db0b56d8b37a8e0e3dee71d83dbea840807340022921c829811747cff4ccd27aade2270d68
SSDEEP
3072:ljkEnTrsEJTqVXHUJePMqvk9sEFU6tiNO85/BEZR6aJjdGE0F6GqJW:lwEnTAEJqKJedvIsn6I9BEZR6an0F1
Checks for missing Authenticode signature.
resource |
---|
6ef25e02286d0255ba2ab615bb9e4d40_NeikiAnalytics.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleHandleW
MultiByteToWideChar
lstrlenA
GetExitCodeProcess
WaitForSingleObject
Sleep
TerminateProcess
GlobalReAlloc
GlobalUnlock
GlobalSize
lstrcpynW
ReadFile
PeekNamedPipe
GetTickCount
CreateProcessW
GetStartupInfoW
CreatePipe
GetProcAddress
lstrcpyW
DeleteFileW
lstrcmpiW
GetCurrentProcess
lstrcatW
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
CreateFileW
CopyFileW
GetTempFileNameW
GlobalFree
GlobalAlloc
GetModuleFileNameW
ExitProcess
GetCommandLineW
GlobalLock
GetVersion
lstrlenW
SendMessageW
FindWindowExW
CharNextW
wsprintfW
CharPrevW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
Exec
ExecToLog
ExecToStack
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE