DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
83119a89146b070b7955a35a06fca9f0_NeikiAnalytics.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
83119a89146b070b7955a35a06fca9f0_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
Target
83119a89146b070b7955a35a06fca9f0_NeikiAnalytics.exe
Size
798KB
MD5
83119a89146b070b7955a35a06fca9f0
SHA1
37d9a4ecf797d6178e945b43695bbc00e0d13647
SHA256
989d06753f62ff33b4ede99bfd7686b6ce9050e862ae8f18205f42288b824834
SHA512
46f1d9aa01507859857310326d56d3be25563d638b3e0dfe9d7f8484e36ba689e59d0153d69404f9c0969cd31c8369b33ee37d86c757fa8a3bb085a88c9417f2
SSDEEP
6144:VXNF5xsTq1v6AS1LP61xSn5hYYn/68nyaMsSDD/kpT8BIMvS3LStqhlbFIKiaT/0:VX5xsov6tzUpBIJzgH6/dHK7nyCl9r
Checks for missing Authenticode signature.
resource |
---|
83119a89146b070b7955a35a06fca9f0_NeikiAnalytics.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LeaveCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
FreeLibrary
GetModuleHandleW
LoadLibraryExW
LoadResource
SizeofResource
lstrcmpiW
FindResourceW
MultiByteToWideChar
DeleteFileW
LocalFree
MoveFileExW
CreateDirectoryW
GetFileAttributesW
GetFileSize
ReadFile
InitializeCriticalSection
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleExW
LocalAlloc
ReleaseMutex
WaitForSingleObject
OpenMutexW
EnterCriticalSection
GetPrivateProfileIntW
GetPrivateProfileStringW
WritePrivateProfileStringW
WritePrivateProfileSectionW
SetFileAttributesW
SetEvent
ResetEvent
CreateEventW
GetVersion
FormatMessageW
FlushFileBuffers
SetEndOfFile
SetFilePointer
WriteFile
GetSystemTimeAsFileTime
MapViewOfFile
UnmapViewOfFile
CreateFileW
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
RaiseException
InitializeCriticalSectionAndSpinCount
GetTempPathW
GetModuleFileNameW
VirtualProtect
Sleep
GetModuleHandleA
GetProcAddress
GetTickCount
SetLastError
GetLastError
GetCurrentProcess
CreateMutexW
CloseHandle
HeapAlloc
LoadLibraryA
GetProcessHeap
HeapFree
lstrlenW
LCMapStringW
LoadLibraryW
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetModuleFileNameA
GetFileType
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStringTypeW
WideCharToMultiByte
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
HeapSize
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
GetSystemInfo
VirtualAlloc
VirtualQuery
GetCommandLineA
HeapReAlloc
GetStdHandle
ExitProcess
ReadConsoleW
CharNextW
CharLowerBuffW
TranslateMessage
DispatchMessageW
PeekMessageW
MsgWaitForMultipleObjects
MessageBoxA
OpenSCManagerW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
OpenServiceW
CloseServiceHandle
ChangeServiceConfigW
GetSidSubAuthorityCount
GetSidSubAuthority
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetNamedSecurityInfoW
RegQueryValueExW
GetSecurityDescriptorSacl
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
CLSIDFromString
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoUninitialize
StringFromGUID2
CoCreateInstance
SysFreeString
SysStringLen
SysAllocStringByteLen
SysStringByteLen
VarBstrCat
DispCallFunc
VariantCopy
VariantClear
VariantInit
SafeArrayCreateVector
SafeArrayPutElement
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayDestroy
SafeArrayCreate
SysAllocStringLen
SysAllocString
RegisterTypeLi
LoadRegTypeLi
LoadTypeLi
VarUI4FromStr
PathFileExistsW
PathIsRelativeW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ