NOD32
NOD33
NOD35
Oreo
nod34
Static task
static1
Behavioral task
behavioral1
Sample
2c99aab9e3d6bcc85720cbec53641f00_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2c99aab9e3d6bcc85720cbec53641f00_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
Target
2c99aab9e3d6bcc85720cbec53641f00_NeikiAnalytics.exe
Size
10.0MB
MD5
2c99aab9e3d6bcc85720cbec53641f00
SHA1
ea52b70e08386fdfc9115abd09ba6b3e8e9e9838
SHA256
8ef202906116e43b8cec82b85b21f24c3fbe499b0e5880c6d30781723326bf73
SHA512
bd0eb3bf74b7edbbacb0fd06c76d8da0e0dfc66e60313d46cff62e6b6c2a3b6a1636af0a9d6f601319077568aa3e3396a565429fd421f801983f3a59002ab39b
SSDEEP
3072:p2LK9Gj4b+XQcVc0Uci3HBBjxRd40suk/nX4wjpGI:c/cNThTRmrJX4wj
Checks for missing Authenticode signature.
resource |
---|
2c99aab9e3d6bcc85720cbec53641f00_NeikiAnalytics.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyA
lstrlenA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
GetFileSize
ReadFile
MoveFileA
Sleep
lstrcatA
GetSystemDirectoryA
CreateProcessA
Process32Next
GetFileAttributesA
Process32First
HeapFree
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
WaitForMultipleObjects
OpenEventA
SetErrorMode
GetCurrentProcess
SetFileAttributesA
ExpandEnvironmentStringsA
GetModuleFileNameA
CreateFileA
CreateDirectoryA
RaiseException
DeleteFileA
GetProcessHeap
HeapAlloc
GetCurrentProcessId
GetLocalTime
GetTickCount
CancelIo
InterlockedExchange
ResetEvent
GetLastError
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
FreeLibrary
LoadLibraryA
lstrcmpiA
GetProcAddress
CloseWindow
IsWindow
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
IsWindowVisible
GetWindowThreadProcessId
ExitWindowsEx
GetCursorPos
GetCursorInfo
DestroyCursor
ReleaseDC
GetDC
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
WindowFromPoint
SetCapture
MapVirtualKeyA
keybd_event
SendMessageA
LoadCursorA
MessageBoxA
GetWindowTextA
wsprintfA
CharNextA
TranslateMessage
DispatchMessageA
GetDesktopWindow
RegQueryValueExA
RegOpenKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegSetValueExA
RegCreateKeyExA
CloseServiceHandle
DeleteService
OpenServiceA
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegOpenKeyA
UnlockServiceDatabase
LockServiceDatabase
CreateServiceA
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
putchar
memmove
atoi
wcstombs
_access
_stricmp
ceil
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
_ftol
strstr
_CxxThrowException
rand
sprintf
strncpy
free
malloc
_except_handler3
strrchr
srand
_strrev
_beginthreadex
??2@YAPAXI@Z
??3@YAXPAX@Z
puts
__CxxFrameHandler
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
NOD32
NOD33
NOD35
Oreo
nod34
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ