Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
291955516fda1d13a5aefdd3a78a4900_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
291955516fda1d13a5aefdd3a78a4900_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Target
291955516fda1d13a5aefdd3a78a4900_NeikiAnalytics.exe
Size
699KB
MD5
291955516fda1d13a5aefdd3a78a4900
SHA1
5cf50a5530345db3a8f3e047a35c8ad4571966c3
SHA256
97a92cfc36d7d81f4aa9000e986846ebcacb1fe849ac2b2f1526517fd7c63d01
SHA512
5260806fdfc34ac81e5699be963fb6c96e73892ca842ce33381bd615cb4eaa0c8b48d74e97490f951d0200a90154c4c3bb664c1a2c5547865ebdd9bbb5537127
SSDEEP
12288:7DzCtxNl5gt8VG/vxanSVC5anjWJ5HmIv0nXXmo/r4:PzCpot8VG/paSy5Hj0nXXx4
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SysReAllocStringLen
SysAllocStringLen
CreateErrorInfo
GetErrorInfo
SetErrorInfo
DispGetIDsOfNames
RegisterTypeLib
LoadTypeLibEx
SysFreeString
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
SysFreeString
SysAllocStringLen
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegFlushKey
RegEnumValueA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
GetKeyboardType
DestroyWindow
LoadStringA
MessageBoxA
CharNextA
CreateWindowExW
CreateWindowExA
mouse_event
keybd_event
TranslateMessage
TranslateAcceleratorA
ShowWindow
SetWindowTextW
SetWindowTextA
SetWindowPos
SetWindowLongA
SetTimer
SetPropA
SetForegroundWindow
SetFocus
SetCursor
SendMessageTimeoutA
SendMessageA
ScreenToClient
RemovePropA
ReleaseDC
RegisterWindowMessageA
RegisterClassW
RegisterClassA
PostThreadMessageA
PostQuitMessage
PostMessageA
PeekMessageA
OffsetRect
MsgWaitForMultipleObjects
MessageBoxW
MessageBoxA
LoadStringA
LoadImageA
LoadIconA
LoadCursorA
KillTimer
IsZoomed
IsWindowVisible
IsWindowEnabled
IsWindow
IsIconic
InvalidateRgn
GetWindowThreadProcessId
GetWindowRect
GetWindowLongA
GetUpdateRgn
GetSystemMetrics
GetSystemMenu
GetSysColor
GetPropA
GetParent
GetKeyState
GetForegroundWindow
GetFocus
GetDesktopWindow
GetDC
GetCursorPos
GetClientRect
GetClassNameA
GetClassLongA
GetClassInfoW
GetClassInfoA
GetCapture
FindWindowExA
FindWindowA
FillRect
EnumWindows
EnumChildWindows
EndPaint
EnableMenuItem
DispatchMessageA
DestroyWindow
DestroyIcon
DestroyAcceleratorTable
DeleteMenu
DefWindowProcW
DefWindowProcA
ClientToScreen
CharUpperBuffW
CharNextW
CharLowerBuffW
CallWindowProcW
CallWindowProcA
BeginPaint
CharNextA
CharLowerBuffA
CharUpperBuffA
CharToOemA
GetACP
Sleep
VirtualFree
VirtualAlloc
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
ExitThread
CreateThread
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetFileType
CreateFileA
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
WritePrivateProfileStringA
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualQuery
VirtualProtect
SystemTimeToFileTime
SizeofResource
SetLastError
SetFileTime
SetFilePointer
SetFileAttributesA
SetEvent
SetErrorMode
SetEndOfFile
ResumeThread
ResetEvent
RemoveDirectoryA
ReadFile
OutputDebugStringA
OpenProcess
MultiByteToWideChar
MoveFileExA
MoveFileA
LockResource
LocalFileTimeToFileTime
LoadResource
LoadLibraryA
LeaveCriticalSection
InitializeCriticalSection
GetVersionExA
GetTickCount
GetThreadLocale
GetTempPathA
GetTempFileNameA
GetStringTypeExW
GetStringTypeExA
GetStdHandle
GetShortPathNameA
GetProcAddress
GetPrivateProfileStringA
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLocalTime
GetLastError
GetFullPathNameW
GetFullPathNameA
GetFileInformationByHandle
GetFileAttributesA
GetExitCodeThread
GetDiskFreeSpaceA
GetDateFormatA
GetCurrentThreadId
GetCurrentThread
GetCurrentProcess
GetCPInfo
GetACP
FreeResource
InterlockedIncrement
InterlockedExchange
InterlockedDecrement
FreeLibrary
FormatMessageW
FormatMessageA
FindResourceA
FindNextFileA
FindFirstFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExpandEnvironmentStringsA
ExitProcess
EnumCalendarInfoA
EnterCriticalSection
DosDateTimeToFileTime
DeleteFileA
DeleteCriticalSection
CreateFileW
CreateFileA
CreateEventA
CreateDirectoryA
CompareStringW
CompareStringA
CloseHandle
Sleep
GetProcAddress
LoadLibraryA
GetModuleHandleA
AlphaBlend
StretchDIBits
SetTextColor
SetROP2
SetPixel
SetBkMode
SetBkColor
SelectObject
SelectClipRgn
MoveToEx
GetTextExtentPoint32A
GetStockObject
GetPixel
GetObjectA
DeleteObject
DeleteDC
CreateSolidBrush
CreateRectRgnIndirect
CreateRectRgn
CreateFontIndirectA
CreateDIBSection
CreateCompatibleDC
CreateCompatibleBitmap
CreateBrushIndirect
CombineRgn
BitBlt
CoTaskMemFree
CoCreateGuid
StringFromCLSID
CoCreateInstance
CoLockObjectExternal
CoDisconnectObject
CoRevokeClassObject
CoRegisterClassObject
CoUninitialize
CoInitialize
IsEqualGUID
CoTaskMemFree
StringFromCLSID
Shell_NotifyIconW
ShellExecuteExA
ShellExecuteA
SHGetPathFromIDListA
SHGetDesktopFolder
InternetSetOptionA
InternetReadFile
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpSendRequestA
HttpQueryInfoA
HttpOpenRequestA
HttpAddRequestHeadersA
SHGetFolderPathA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ