DLD
LSD_F3
Static task
static1
Behavioral task
behavioral1
Sample
33e81b4315c67efceef33b72a4e25990_NeikiAnalytics.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
33e81b4315c67efceef33b72a4e25990_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
Target
33e81b4315c67efceef33b72a4e25990_NeikiAnalytics.exe
Size
14KB
MD5
33e81b4315c67efceef33b72a4e25990
SHA1
384d2b8c320c57d615b61b3b3250785ff5f38f4e
SHA256
208cd73ea6278cbf9a1ccd2d3803421a1539d251025087ab9f9709fc6e222a0b
SHA512
5ae164e490538e1fb91f23684c026160e7d661d5cf064243d6def167e7fd1111f80362101b37d3757f7ac741603fd75bcd3e3a55930fc7341d30c9f3ab2a646b
SSDEEP
192:XbGp59szIHhY9greY9G6SERyfw1uT1M4Xyr4wu:QXszIHhY9greY9G6SERyfw1uT1rXH
Checks for missing Authenticode signature.
resource |
---|
33e81b4315c67efceef33b72a4e25990_NeikiAnalytics.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetWindowTextA
wsprintfA
GetClassNameA
EnumChildWindows
GetForegroundWindow
VirtualProtectEx
_lwrite
CloseHandle
CreateFileA
CreateThread
DeviceIoControl
ExitThread
GetLocalTime
GetProcAddress
GetSystemDirectoryA
GlobalAddAtomA
GlobalFindAtomA
LoadLibraryA
OpenProcess
RtlZeroMemory
Sleep
VirtualAlloc
lstrlenA
_llseek
_lread
lstrcatA
lstrcpyA
lstrcpynA
ord5
VirtualProtectEx
_lwrite
CloseHandle
CreateFileA
CreateThread
DeviceIoControl
ExitThread
GetLocalTime
GetProcAddress
GetSystemDirectoryA
GlobalAddAtomA
GlobalFindAtomA
LoadLibraryA
OpenProcess
RtlZeroMemory
Sleep
VirtualAlloc
lstrlenA
_llseek
_lread
lstrcatA
lstrcpyA
lstrcpynA
ord5
ShellExecuteA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
recv
closesocket
connect
gethostbyname
WSAStartup
send
socket
WSACleanup
DLD
LSD_F3
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ