Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
5a0b2c88d214e16b4e1092842d8ef470_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5a0b2c88d214e16b4e1092842d8ef470_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Target
5a0b2c88d214e16b4e1092842d8ef470_NeikiAnalytics.exe
Size
355KB
MD5
5a0b2c88d214e16b4e1092842d8ef470
SHA1
e8c842568350fcdb552f7b735c87d2714dfb244d
SHA256
f69597ec823be88eeb7148fac9387a6025dbcbdc665c1806dcc566c9d2d1bdca
SHA512
2abd57360f3c7badba40d7d273326aee2080740f454129384629996071a41be619fad9f1c0dc32167fa6506ea02a1421f64ad40249c997c8affd4242e5b09307
SSDEEP
6144:VklL4dOUGIVI9H8yiDJB0jRm9WjONGtD+Y6IkwIItj3YcFJx+9:Vco2BCUCWjoo6IkDI5o4Jx+9
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
BraveCrashHandler64_unsigned.pdb
GetProcessHeap
DeleteCriticalSection
GetProcAddress
GetModuleHandleW
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwindEx
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
EncodePointer
RtlPcToFileHeader
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
GetCurrentThread
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTempPathW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
GetFileType
SetStdHandle
GetStringTypeW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
HeapDestroy
SetFilePointerEx
ReadFile
CreateFileW
CloseHandle
WriteConsoleW
SizeofResource
WaitForMultipleObjects
WaitForSingleObject
ReleaseMutex
DuplicateHandle
GetFileAttributesExW
LockResource
DeleteFileW
LoadLibraryW
FindResourceExW
LoadResource
FindResourceW
WaitNamedPipeW
GetTempFileNameW
lstrcmpiW
GetTickCount
GetExitCodeProcess
GetEnvironmentVariableW
GetSystemDirectoryW
VirtualQuery
OpenProcess
Sleep
ReadProcessMemory
CreateDirectoryW
lstrlenW
SetFilePointer
MoveFileExW
GetFileTime
CreateProcessW
SetProcessWorkingSetSize
GetPrivateProfileIntW
OutputDebugStringA
GetFileInformationByHandle
GetLocalTime
lstrcmpW
GetVersionExW
VerSetConditionMask
VerifyVersionInfoW
TryEnterCriticalSection
InitializeCriticalSection
CreateMutexW
CreateEventW
SetEvent
ResetEvent
lstrcpynW
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
WaitForDebugEvent
GetProcessId
DebugActiveProcessStop
ContinueDebugEvent
GetSystemInfo
GetThreadContext
DebugActiveProcess
VirtualQueryEx
SetNamedPipeHandleState
CreateSemaphoreW
ReleaseSemaphore
CreateThread
InitializeCriticalSectionEx
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
GetLastError
HeapSize
LocalFree
TransactNamedPipe
GetSystemDefaultLangID
GetUserDefaultLangID
DeviceIoControl
GetComputerNameExW
ConnectNamedPipe
GetOverlappedResult
DisconnectNamedPipe
CreateNamedPipeW
GetProcessTimes
UnregisterWait
UnregisterWaitEx
RegisterWaitForSingleObject
VirtualProtect
VirtualAlloc
InitializeCriticalSectionAndSpinCount
GetFileSizeEx
HeapFree
EnumWindows
CharUpperW
CharLowerW
GetMessageW
DispatchMessageW
PeekMessageW
IsWindowVisible
CloseWindowStation
SetThreadDesktop
GetThreadDesktop
CloseDesktop
CreateDesktopW
SetProcessWindowStation
GetProcessWindowStation
CreateWindowStationW
PostThreadMessageW
OpenClipboard
CloseClipboard
GetWindowThreadProcessId
EmptyClipboard
SetClipboardData
MessageBoxW
wvsprintfW
wsprintfW
SetTokenInformation
TraceEvent
GetTraceLoggerHandle
GetTraceEnableFlags
GetTraceEnableLevel
RegisterTraceGuidsW
UnregisterTraceGuids
GetTokenInformation
SetSecurityDescriptorGroup
MakeAbsoluteSD
MakeSelfRelativeSD
OpenThreadToken
GetSecurityDescriptorLength
GetLengthSid
InitializeAcl
InitializeSecurityDescriptor
OpenProcessToken
AddAce
IsValidSid
ImpersonateLoggedOnUser
GetSecurityDescriptorOwner
InitializeSid
ConvertStringSidToSidW
CopySid
GetSecurityDescriptorControl
SetNamedSecurityInfoW
GetSidLengthRequired
GetSidSubAuthority
GetSecurityDescriptorGroup
EqualSid
GetAce
SetSecurityDescriptorOwner
GetAclInformation
GetSecurityDescriptorDacl
RevertToSelf
SetSecurityDescriptorDacl
GetSecurityDescriptorSacl
ConvertSidToStringSidW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegEnumValueW
RegDeleteValueW
RegSetValueExW
RegEnumKeyExW
RegCreateKeyExW
RegDeleteKeyW
RegQueryInfoKeyW
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
NtDeleteKey
CoCreateGuid
StringFromGUID2
IIDFromString
SHGetFolderPathW
ord680
NetApiBufferFree
NetGetJoinInformation
NetWkstaGetInfo
UuidCreate
PathStripPathW
PathRemoveExtensionW
PathRemoveFileSpecW
SHQueryValueExW
PathCanonicalizeW
PathAppendW
UnloadUserProfile
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ