Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
6604fb03b92dc660939296266efdc3d0_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6604fb03b92dc660939296266efdc3d0_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
Target
6604fb03b92dc660939296266efdc3d0_NeikiAnalytics.exe
Size
713KB
MD5
6604fb03b92dc660939296266efdc3d0
SHA1
cd5df637741c8a958906da0d981c059768fb68a7
SHA256
137e40b90ba37a5b8490f99f85d4ddc331d7becd7b6e9e1fa2dc522f9feb7caf
SHA512
4b61000df0fa2a9a6c29830aa10a80652a2e645ebdbfefe1a7025aa19f7bfb22123c6568e14e154757e53c8120f6fb4d00c2777d644d673cd623f4807908fe07
SSDEEP
12288:FfseeXhFVL8AL4ej76xhVE3qyUUTSmo0q9Hn/:FUVv+e/6xhVE3qyhTSmPq1n/
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
lstrcmpiW
lstrcpyW
lstrcatW
FindResourceW
GetSystemDefaultLCID
EncodePointer
GlobalAlloc
GlobalReAlloc
GlobalSize
GlobalLock
GlobalUnlock
GlobalFree
LocalFree
FormatMessageW
CreateFileW
DeleteFileW
GetFileSizeEx
GetTempFileNameW
ReadFile
SizeofResource
WriteFile
GetTempPathW
CloseHandle
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
SetEndOfFile
ReadConsoleW
WriteConsoleW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
LoadResource
LoadLibraryExW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
FreeLibrary
GetSystemDirectoryW
InitializeCriticalSectionEx
GetLastError
RaiseException
DecodePointer
GetFileAttributesExW
GetFileAttributesW
GetACP
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
lstrlenW
lstrcpynW
FileTimeToSystemTime
GetSystemTimeAsFileTime
GetCalendarInfoW
GetLocaleInfoW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
SetFilePointer
EnterCriticalSection
FindNextFileA
FindFirstFileExA
FindClose
GetProcessHeap
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
HeapSize
GetFileType
GetStdHandle
GetModuleFileNameA
GetModuleHandleExW
ExitProcess
HeapFree
HeapReAlloc
HeapAlloc
RtlUnwindEx
RtlPcToFileHeader
GetStringTypeW
GetCurrentThreadId
QueryPerformanceCounter
SetLastError
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LCMapStringW
GetCPInfo
InitializeSListHead
SetEvent
ResetEvent
WaitForSingleObjectEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
OutputDebugStringW
GetCurrentThread
GetThreadTimes
InterlockedFlushSList
CreateWindowExW
CharNextW
GetDC
ReleaseDC
LoadStringW
DefWindowProcW
wsprintfW
LoadIconW
MessageBoxW
DestroyWindow
RegisterClassExW
UnregisterClassW
SetWindowOrgEx
SetWindowExtEx
SetViewportExtEx
CreateDIBSection
SetEnhMetaFileBits
PlayEnhMetaFile
DeleteEnhMetaFile
SetMetaFileBitsEx
SetMapMode
SelectObject
PlayMetaFile
DeleteMetaFile
DeleteDC
CreateCompatibleDC
DeleteObject
GdiFlush
RegSetValueW
RegQueryValueW
RegQueryInfoKeyW
RegOpenKeyExW
RegOpenKeyW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCreateKeyW
RegCloseKey
RegSetValueExW
StringFromGUID2
CoCreateInstance
CoInitialize
CreateStreamOnHGlobal
CoTaskMemAlloc
StringFromCLSID
CoTaskMemFree
CoUninitialize
CoTaskMemRealloc
UnRegisterTypeLi
VariantChangeType
SafeArrayDestroyDescriptor
SafeArrayAllocDescriptor
SysAllocStringByteLen
SysStringByteLen
VariantInit
SafeArrayDestroy
RegisterTypeLi
LoadTypeLi
VariantClear
SafeArrayUnaccessData
SafeArrayAccessData
VarUI4FromStr
SysStringLen
SysFreeString
SysAllocString
StrStrIA
StrStrIW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
PrismAlert
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ