_�����ӳ���
��װ
�һ�
����
�˳�
�
Behavioral task
behavioral1
Sample
88416908f90ab59e9f0c56272828a4b0_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
88416908f90ab59e9f0c56272828a4b0_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
Target
88416908f90ab59e9f0c56272828a4b0_NeikiAnalytics.exe
Size
3.0MB
MD5
88416908f90ab59e9f0c56272828a4b0
SHA1
ad1b6a29a043a6e86dfe2b79934c475ba1cd2bf1
SHA256
f67e829d530c7a22a7af485101b0269a02122299ef57938b27070e75a64283f1
SHA512
e952ec195d8c5d6296821f967f7b03aa74d552d2da2d00ce5dfe2b251d97de983ce4ec118f2e7f006cf08ab37a3b729fc85b9820592c3819a8abd47e8c40419d
SSDEEP
49152:P4gyA101YWn+OYKQMLq8OmRlyv7StNaqLwUv4AA9PIxRBdbnPBF:Qd1YO+OYKQDAlWQaqxviPKRBdbnP
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
88416908f90ab59e9f0c56272828a4b0_NeikiAnalytics.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RasHangUpA
GetVersionExA
GetVersion
Thread32First
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
InvalidateRect
CreateBrushIndirect
waveOutUnprepareHeader
GradientFill
OpenPrinterA
RegQueryValueExA
ShellExecuteA
OleUninitialize
SafeArrayAccessData
_TrackMouseEvent
ioctlsocket
HttpQueryInfoA
StrToIntExW
GetFileTitleA
_�����ӳ���
��װ
�һ�
����
�˳�
�
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ