DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
14250fd044b3b1b799c59a13b90768d73b7075bfd4618bf61273a5e39460c4c0_NeikiAnalytics.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
14250fd044b3b1b799c59a13b90768d73b7075bfd4618bf61273a5e39460c4c0_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
Target
14250fd044b3b1b799c59a13b90768d73b7075bfd4618bf61273a5e39460c4c0_NeikiAnalytics.exe
Size
594KB
MD5
afc2505ee2f490b854b49d0e3ff17250
SHA1
f7ae5995054f818c3224067d059431f12324b235
SHA256
14250fd044b3b1b799c59a13b90768d73b7075bfd4618bf61273a5e39460c4c0
SHA512
25a434e350084879dca15ec91cef5c59218245215c1f52848bcefe064e241fbcc5d8796216e5c98fafbe0cc78941ef9b1c64010c85e117f49eb1313983aa99e1
SSDEEP
12288:CO8SFprK1pnOTSOdHGLcCeXqjfMVKAw0wca562napPH4s9ofeMA5L:eSFpuXnOTp+c56jfMY9cak2naVHjofe
Checks for missing Authenticode signature.
resource |
---|
14250fd044b3b1b799c59a13b90768d73b7075bfd4618bf61273a5e39460c4c0_NeikiAnalytics.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
__vbaVarTstGt
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE