DllCanUnloadNow
DllGetActivationFactory
DllGetClassObject
Static task
static1
Behavioral task
behavioral1
Sample
256fb453be012bf16665f0fd9b1c8dc0_NeikiAnalytics.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
256fb453be012bf16665f0fd9b1c8dc0_NeikiAnalytics.dll
Resource
win10v2004-20240611-en
Target
256fb453be012bf16665f0fd9b1c8dc0_NeikiAnalytics.exe
Size
91KB
MD5
256fb453be012bf16665f0fd9b1c8dc0
SHA1
49c18e28d8a4576ca0ff4008c394655dd65103c2
SHA256
25f2b4d52ccdfcf90af1fa244fe4ea8f0fad1ab0f916439143c57b04fc04c252
SHA512
ff9b95c70eeea55f18326872d1b46cd2ca7c6d11d740416d1b9e602a5e84f87df14e76ded5dc7797ec560277596a131d9394254895764d218392f200218bf751
SSDEEP
768:IqTbcLsWkvH6/uRaah6WZQ/vewhqoFxWSga:NRa+AvFq4xWSga
Checks for missing Authenticode signature.
resource |
---|
256fb453be012bf16665f0fd9b1c8dc0_NeikiAnalytics.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
CoCreateInstance
WindowsCreateString
WindowsGetStringRawBuffer
DisableThreadLibraryCalls
GetModuleHandleW
GetProcAddress
GetTickCount
HeapAlloc
HeapReAlloc
IsBadStringPtrW
QueryPerformanceCounter
QueryPerformanceFrequency
_vsnprintf
SysAllocString
SysFreeString
VariantClear
__acrt_iob_func
__stdio_common_vsprintf
_strdup
free
fwrite
getenv
memcmp
memmove
strchr
strcmp
strcspn
strlen
wcscmp
wcslen
DllCanUnloadNow
DllGetActivationFactory
DllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ