DllCanUnloadNow
DllGetClassObject
Static task
static1
Behavioral task
behavioral1
Sample
4085424728341a50a0b69a3bb865a8e2878f86f3f83bbf6190b985b2ba136b54_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4085424728341a50a0b69a3bb865a8e2878f86f3f83bbf6190b985b2ba136b54_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
Target
4085424728341a50a0b69a3bb865a8e2878f86f3f83bbf6190b985b2ba136b54_NeikiAnalytics.exe
Size
405KB
MD5
4c762e2e492ba83b7ed91810232ee2c0
SHA1
1243c31014dcef5a0e942f71309034ca60f5e82f
SHA256
4085424728341a50a0b69a3bb865a8e2878f86f3f83bbf6190b985b2ba136b54
SHA512
212d61e6735e12ec04e8162fdcddbf220476bc31c3183614e3cec71291bfd24463c73bedf83dc70f1261e37d84f3a5202ba3c4d2f35312b06516308f8d85e9a3
SSDEEP
6144:MqtAOxysCFX6ztkKL3btNTYIl8/FXeXLYs6AOD/QLWO9I44AHJZqoZUT5+2EuIn:bzys4X6SKDRifYLYzqCkzZUV+aK
Checks for missing Authenticode signature.
resource |
---|
4085424728341a50a0b69a3bb865a8e2878f86f3f83bbf6190b985b2ba136b54_NeikiAnalytics.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
wcsrchr
??2@YAPAXI@Z
strncmp
wcscmp
wcscpy
EngLockSurface
EngStretchBltROP
EngLoadModule
EngFreeModule
EngGetDriverName
EngFindResource
EngQueryLocalTime
EngDeleteSurface
EngUnlockSurface
EngBitBlt
EngAssociateSurface
EngCreateBitmap
EngEraseSurface
EngStrokePath
EngFillPath
EngStrokeAndFillPath
EngPaint
EngLineTo
EngTextOut
SetLastError
lstrcmpiW
lstrlenW
GlobalAlloc
GlobalFree
DebugBreak
IsBadWritePtr
InterlockedIncrement
InterlockedDecrement
HeapFree
HeapAlloc
IsBadReadPtr
lstrcpyW
lstrcatW
WideCharToMultiByte
GetProcessHeap
_lclose
OpenFile
GetLastError
_lread
GetPrinterDriverW
DllCanUnloadNow
DllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ