@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
Static task
static1
Behavioral task
behavioral1
Sample
18daa56f0945773273fdb4b68137d5c0919f0dc02446c59b17f8c85e1193d236_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
18daa56f0945773273fdb4b68137d5c0919f0dc02446c59b17f8c85e1193d236_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Target
18daa56f0945773273fdb4b68137d5c0919f0dc02446c59b17f8c85e1193d236_NeikiAnalytics.exe
Size
318KB
MD5
0b7df2b36613f0e5e0aabf3806033090
SHA1
891c018672ce8f9994d19b8eb0448dbc352adfa0
SHA256
18daa56f0945773273fdb4b68137d5c0919f0dc02446c59b17f8c85e1193d236
SHA512
5d916f3a5617ee2e1c17e2b52bd5c04023f853a62fe6e18d00875f1be69b1bbb2f6f62fd3674cb1ee0936643939f9ea7d4328a519877e4b14a7a99445a97cc08
SSDEEP
1536:wgp82FLmbfwOzGO/sT8G32wzf+NJQlaFcR7SW0/wjWcRnU9uWom:7pxFSbwOpkU4z7SW0/yRhm
Checks for missing Authenticode signature.
resource |
---|
18daa56f0945773273fdb4b68137d5c0919f0dc02446c59b17f8c85e1193d236_NeikiAnalytics.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
GetVersionExA
RaiseException
GetLocalTime
CreateFileA
GetModuleHandleA
GetCommandLineA
ExitProcess
LeaveCriticalSection
GetLastError
GlobalMemoryStatus
TlsFree
SetHandleCount
EnterCriticalSection
RtlUnwind
GetFileAttributesA
GetTimeZoneInformation
GetFileType
GetStartupInfoA
TlsSetValue
InitializeCriticalSection
UnhandledExceptionFilter
CloseHandle
GetCurrentThreadId
TlsGetValue
GetProcAddress
TlsAlloc
GetEnvironmentStrings
SetFilePointer
SetConsoleCtrlHandler
GetModuleFileNameA
GetStdHandle
VirtualAlloc
VirtualFree
VirtualQuery
WriteFile
GetVersion
SelectObject
GetDeviceCaps
DeleteObject
DeleteDC
CreateICA
GetObjectA
CreateCompatibleDC
BitBlt
TranslateMessage
ShowWindow
SetTimer
RegisterClassA
PostQuitMessage
PostMessageA
MessageBoxA
LoadIconA
LoadCursorA
LoadBitmapA
KillTimer
GetMessageA
GetDC
ReleaseDC
EnumThreadWindows
DispatchMessageA
DefWindowProcA
UpdateWindow
CreateWindowExA
wsprintfA
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ