DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
6388f00fa53f9b5ff4362b1667c12680f8a1d1efe3b75e6124f8a3faae96da5a_NeikiAnalytics.dll
Resource
win7-20240508-en
Target
6388f00fa53f9b5ff4362b1667c12680f8a1d1efe3b75e6124f8a3faae96da5a_NeikiAnalytics.exe
Size
169KB
MD5
6790d1d5e4e4b35f3cb64d27a0aaea00
SHA1
7fb356b6cdeac8b483ecfffc9fb1157fe52cea5e
SHA256
6388f00fa53f9b5ff4362b1667c12680f8a1d1efe3b75e6124f8a3faae96da5a
SHA512
6f0a076043f6922676d52f75da5ec7347fea713e191fe9fcdd2461e09e834b83e8d89d3334a6f60bffb7f710085a15319e6e4968c3c7c85acce7c563bbfa2d2e
SSDEEP
3072:ELgYVpScxpIaygogQFjSihOYAg0FuDXOBniLCvWTnLh0U:YCXg++YAOmnS/LG
Checks for missing Authenticode signature.
resource |
---|
6388f00fa53f9b5ff4362b1667c12680f8a1d1efe3b75e6124f8a3faae96da5a_NeikiAnalytics.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryExW
LoadResource
SizeofResource
FindResourceW
lstrcmpiW
MultiByteToWideChar
DecodePointer
InitializeCriticalSection
DisableThreadLibraryCalls
CreateFileW
GetFileSize
ReadFile
CloseHandle
GetModuleHandleA
LocalFree
FormatMessageW
GetCurrentProcessId
GetProcAddress
GetThreadLocale
SetThreadLocale
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
WriteFile
SetStdHandle
GetFileType
GetStdHandle
GetProcessHeap
GetModuleHandleW
GetModuleFileNameW
FreeLibrary
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
GetLastError
EncodePointer
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
GetACP
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetModuleFileNameA
GetModuleHandleExW
ExitProcess
RaiseException
InterlockedFlushSList
RtlUnwind
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
WideCharToMultiByte
GetStringTypeW
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LCMapStringW
DestroyWindow
wsprintfW
CharNextW
IsWindowVisible
PostMessageW
SetWindowLongW
GetWindowLongW
SetTimer
CreateWindowExW
RegisterClassW
DefWindowProcW
SystemFunction036
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
CoCreateInstance
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
StringFromGUID2
SysAllocStringLen
SysAllocString
RegisterTypeLi
UnRegisterTypeLi
VarBstrCmp
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayDestroy
SafeArrayCreate
SysAllocStringByteLen
SysStringByteLen
DispCallFunc
CreateStdDispatch
CreateDispTypeInfo
LoadRegTypeLi
LoadTypeLi
VarBstrCat
VarUI4FromStr
VariantClear
VariantInit
SysStringLen
SysFreeString
StrStrIW
StrStrW
DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ