DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
03fe44630c6632bf3cd8931da2c399ca7bb8a921ceb2bc461e9d424af476670a_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
03fe44630c6632bf3cd8931da2c399ca7bb8a921ceb2bc461e9d424af476670a_NeikiAnalytics.dll
Resource
win10v2004-20240611-en
Target
03fe44630c6632bf3cd8931da2c399ca7bb8a921ceb2bc461e9d424af476670a_NeikiAnalytics.exe
Size
136KB
MD5
3436adb1a178831e8776839bd15a8080
SHA1
7c213e858067e114a76c12d78265510fc53d194b
SHA256
03fe44630c6632bf3cd8931da2c399ca7bb8a921ceb2bc461e9d424af476670a
SHA512
e96ec98373dd57f318f2abdd7b35446f0278edd2db949a164c106362917f588af07a46006b9cc19b607f5e09f4615ae93bc3df5abd9721559a8c463492ae7629
SSDEEP
3072:x1woS2wr9VSU1FBVZV+wUKHzKdVeTQ8YjJLx2ars1wwQpHHxVmC9uDgSu99+ya2m:ZSjKVX9uDjOH
Checks for missing Authenticode signature.
resource |
---|
03fe44630c6632bf3cd8931da2c399ca7bb8a921ceb2bc461e9d424af476670a_NeikiAnalytics.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
EVENT_SINK_GetIDsOfNames
_CIcos
_adj_fptan
__vbaStrI4
__vbaVarMove
__vbaVarVargNofree
__vbaFreeVar
__vbaAptOffset
__vbaStrVarMove
__vbaLateIdCall
__vbaLenBstr
__vbaFreeVarList
_adj_fdiv_m64
ord698
EVENT_SINK_Invoke
__vbaVarIndexStore
__vbaRaiseEvent
__vbaFreeObjList
ord516
_adj_fprem1
__vbaStrCat
__vbaForEachCollAd
__vbaBoolErrVar
__vbaSetSystemError
__vbaLenBstrB
__vbaHresultCheckObj
_adj_fdiv_m32
Zombie_GetTypeInfo
__vbaAryDestruct
ord591
EVENT_SINK2_Release
__vbaExitProc
__vbaForEachCollObj
__vbaOnError
__vbaObjSet
_adj_fdiv_m16i
ord303
__vbaObjSetAddref
_adj_fdivr_m16i
ord598
__vbaFpR4
__vbaBoolVar
ord309
__vbaVargVar
__vbaFpR8
__vbaBoolVarNull
_CIsin
__vbaErase
__vbaVarZero
__vbaNextEachCollObj
__vbaChkstk
__vbaFileClose
__vbaCyVar
EVENT_SINK_AddRef
__vbaGenerateBoundsError
ord529
__vbaStrCmp
__vbaVarTstEq
__vbaI2I4
__vbaObjVar
DllFunctionCall
__vbaVarLateMemSt
__vbaCastObjVar
_adj_fpatan
__vbaR4Var
__vbaLateIdCallLd
Zombie_GetTypeInfoCount
__vbaRedim
__vbaR8Cy
EVENT_SINK_Release
__vbaNew
_CIsqrt
__vbaObjIs
__vbaVarAnd
EVENT_SINK_QueryInterface
ord710
__vbaExceptHandler
__vbaPrintFile
ord712
_adj_fprem
_adj_fdivr_m64
__vbaLateIdStAd
__vbaFailedFriend
ord608
__vbaFPException
ord319
__vbaUbound
__vbaStrVarVal
__vbaVarCat
__vbaCheckType
__vbaI2Var
ord644
_CIlog
__vbaErrorOverflow
__vbaFileOpen
ord648
__vbaNew2
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
ord573
EVENT_SINK2_AddRef
ord681
__vbaFreeStrList
__vbaVarNot
_adj_fdivr_m32
_adj_fdiv_r
ord685
__vbaVarTstNe
ord101
ord102
__vbaI4Var
ord103
__vbaVarCmpEq
ord104
ord105
__vbaLateMemCall
__vbaVarAdd
ord320
__vbaVarDup
ord321
__vbaVerifyVarObj
__vbaFpI2
__vbaFpI4
__vbaVarCopy
__vbaVarLateMemCallLd
__vbaLateMemCallLd
_CIatan
__vbaStrMove
__vbaCastObj
__vbaStrVarCopy
_allmul
__vbaLateIdSt
_CItan
__vbaNextEachCollAd
_CIexp
__vbaFreeObj
__vbaFreeStr
__vbaI4ErrVar
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ