Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
25846f51bd6f805203e905eb1040a6a0_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
25846f51bd6f805203e905eb1040a6a0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Target
25846f51bd6f805203e905eb1040a6a0_NeikiAnalytics.exe
Size
1.2MB
MD5
25846f51bd6f805203e905eb1040a6a0
SHA1
382db227e377ebc59b5a2d926912fff1afdb1fa4
SHA256
c61a4f1e54c59953e1bdb3bd2b4c28e98c1b8423699198fdc3ae6e48a5e1acab
SHA512
b4b234f7ebaf32c8417440114ee62d53052544b1205daef35d62010f9d7bd036cb46f6c576dcfb1d4cdb8db2b58e2823c4a88c944d598489b2e1333b8a21e057
SSDEEP
24576:t8e3Kr1enmdmkBB4PN61yCEXcE3p3HJNydeTevZug5+XN:WBBspJNydeTevZug5EN
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetFileAttributesW
CreateNamedPipeW
WaitNamedPipeW
CancelIo
GetComputerNameW
GetVersionExW
MultiByteToWideChar
WideCharToMultiByte
GetConsoleWindow
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
DecodePointer
GetTickCount
GetStartupInfoW
SetLastError
SetEndOfFile
WaitForMultipleObjectsEx
SetEnvironmentVariableA
ReadConsoleW
WriteConsoleW
SetStdHandle
GetCommandLineW
CreateProcessW
GetModuleHandleW
GetModuleFileNameW
LoadLibraryW
CancelWaitableTimer
SetWaitableTimer
CreateWaitableTimerW
CreateEventW
OpenMutexW
CreateMutexW
lstrcmpW
ConnectNamedPipe
CloseHandle
ReadFile
WriteFile
Sleep
WaitForMultipleObjects
WaitForSingleObject
ReleaseMutex
ResetEvent
SetEvent
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SetErrorMode
GetOverlappedResult
CreateFileW
GetExitCodeProcess
TerminateProcess
GetCurrentProcess
OpenProcess
LocalFree
GetProcAddress
FreeLibrary
InterlockedDecrement
FindResourceExW
LockResource
FindResourceW
SizeofResource
LoadResource
GetLastError
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetTimeZoneInformation
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
SetProcessAffinityMask
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
SetConsoleCtrlHandler
CreateDirectoryW
RaiseException
SetCurrentDirectoryW
GetOEMCP
GetACP
IsValidCodePage
SetFilePointerEx
GetFileType
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
LoadLibraryExW
ExitThread
lstrlenA
lstrlenW
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GetStringTypeW
DuplicateHandle
GetCurrentThread
GetExitCodeThread
GetSystemTimeAsFileTime
EncodePointer
IsProcessorFeaturePresent
RtlUnwind
ExitProcess
GetModuleHandleExW
AreFileApisANSI
FatalAppExitA
TryEnterCriticalSection
CreateTimerQueue
RtlCaptureStackBackTrace
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
CreateSemaphoreW
GetClassNameW
GetWindowThreadProcessId
SendMessageTimeoutW
UnregisterClassW
EnumWindows
EnumChildWindows
CharLowerBuffW
RegisterWindowMessageW
CryptExportKey
SetNamedSecurityInfoW
ConvertSidToStringSidW
CryptDuplicateKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptDecrypt
CryptEncrypt
CryptImportKey
CryptDestroyKey
CryptDeriveKey
CryptGenKey
CryptReleaseContext
CryptAcquireContextW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
DuplicateTokenEx
CreateProcessAsUserW
LookupAccountNameW
LookupAccountSidW
SetFileSecurityW
MakeAbsoluteSD
MakeSelfRelativeSD
GetSecurityDescriptorGroup
GetSecurityDescriptorOwner
GetSecurityDescriptorSacl
GetSecurityDescriptorDacl
SetSecurityDescriptorDacl
GetSecurityDescriptorControl
GetSecurityDescriptorLength
InitializeSecurityDescriptor
AddAce
GetAclInformation
InitializeAcl
CopySid
GetLengthSid
GetSidSubAuthority
InitializeSid
GetSidLengthRequired
IsValidSid
GetTokenInformation
OpenProcessToken
SHGetFolderPathW
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CLSIDFromString
CoCreateInstance
CoUninitialize
VarBstrCmp
VariantClear
VariantInit
SysAllocStringByteLen
SysStringByteLen
SysStringLen
SysFreeString
SysAllocString
GetErrorInfo
VariantChangeType
SetErrorInfo
CreateErrorInfo
PathAppendW
PathCombineA
PathCombineW
PathFileExistsW
PathMakePrettyW
PathRemoveArgsW
PathRemoveExtensionW
PathRemoveFileSpecW
PathStripPathW
PathUnquoteSpacesW
CryptStringToBinaryA
CryptBinaryToStringA
WinHttpConnect
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpOpenRequest
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpOpen
WinHttpCloseHandle
WinHttpSendRequest
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
GetModuleFileNameExW
DestroyEnvironmentBlock
CreateEnvironmentBlock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ