DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
03d6533a886e456f3ec8fd8ceadf5a471ca218c113afeaa5ec7d3c2768845ae0_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
03d6533a886e456f3ec8fd8ceadf5a471ca218c113afeaa5ec7d3c2768845ae0_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
Target
03d6533a886e456f3ec8fd8ceadf5a471ca218c113afeaa5ec7d3c2768845ae0_NeikiAnalytics.exe
Size
88KB
MD5
ea0fb393f0569fe80448726824ef3cd0
SHA1
a2dccf4cb9c8863cc13c8460c7851246a6eb26da
SHA256
03d6533a886e456f3ec8fd8ceadf5a471ca218c113afeaa5ec7d3c2768845ae0
SHA512
3d9dedea28fe7e91e49774f37981c4175475294e7037f91407bd20d659d571a62e26e8a2646b2c4ec6a62ba0f0116b6d2901164b9d45dc5ad6e1944a301b8058
SSDEEP
1536:op90Q8zb+jn4AryQ/3QGYXvHO7RwgVCy6kMxWuktvl8UnT:okQa6sAT4jywg7ixWuul8OT
Checks for missing Authenticode signature.
resource |
---|
03d6533a886e456f3ec8fd8ceadf5a471ca218c113afeaa5ec7d3c2768845ae0_NeikiAnalytics.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RaiseException
GetLastError
lstrcatA
lstrcpyA
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
lstrlenA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
GetModuleFileNameA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InterlockedIncrement
DisableThreadLibraryCalls
OpenMutexA
CloseHandle
Sleep
GlobalLock
GlobalUnlock
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetModuleHandleA
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
lstrcpynA
lstrcmpiA
IsDBCSLeadByte
InterlockedDecrement
FreeLibrary
IsBadCodePtr
IsBadReadPtr
LoadLibraryA
GetCPInfo
GetOEMCP
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
WriteFile
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
HeapFree
HeapReAlloc
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCurrentThreadId
GetCommandLineA
ExitProcess
RtlUnwind
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetProcAddress
TerminateProcess
GetCurrentProcess
HeapSize
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
LoadStringA
LoadCursorA
FindWindowA
CharNextA
SetCursor
InsertMenuItemA
MessageBoxA
LoadStringW
PostMessageA
SendMessageA
SetActiveWindow
SetForegroundWindow
RegOpenKeyExA
RegQueryInfoKeyA
RegCloseKey
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegEnumKeyExA
RegQueryValueExA
ShellExecuteA
SHGetSpecialFolderPathA
DragQueryFileA
ReleaseStgMedium
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
StringFromGUID2
CoCreateInstance
RegisterTypeLi
SysAllocString
SysStringLen
LoadTypeLi
LoadRegTypeLi
SysFreeString
VarUI4FromStr
PathFindExtensionA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ