DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
472b88dc5c6b1ab0de40a42a608e1bd8ff77fc868ed436d0c463068133ff878e_NeikiAnalytics.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
472b88dc5c6b1ab0de40a42a608e1bd8ff77fc868ed436d0c463068133ff878e_NeikiAnalytics.dll
Resource
win10v2004-20240226-en
Target
472b88dc5c6b1ab0de40a42a608e1bd8ff77fc868ed436d0c463068133ff878e_NeikiAnalytics.exe
Size
196KB
MD5
26200b5385cc930bd8205ee66f457830
SHA1
0e444c082044504b2794295b679f67d6a4443bc9
SHA256
472b88dc5c6b1ab0de40a42a608e1bd8ff77fc868ed436d0c463068133ff878e
SHA512
dc55fa5115d41087073f757a8921d8d1ae60d96e756968b996e2a2499cb00dfb21e895167ea375d2f8fd6f236b90f39dd7db35539578618069978bc0b63d9a66
SSDEEP
3072:f02DSyL6JuHiD0ptZ3BMiU/nM22OebCNPajX9WM96QsT2FHNvKoc1joX5:fUEqkxMiU/M5OeIP49x/sT2FtvKlU
Checks for missing Authenticode signature.
resource |
---|
472b88dc5c6b1ab0de40a42a608e1bd8ff77fc868ed436d0c463068133ff878e_NeikiAnalytics.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_strnicmp
atoi
atof
_mbsnbcpy
_mbsnbcat
_mbsrchr
strstr
_stat
strncmp
swprintf
_vsnprintf
strncpy
memmove
_ftol
time
sprintf
__CxxFrameHandler
??2@YAPAXI@Z
atol
??3@YAXPAX@Z
_purecall
timeGetTime
timeSetEvent
GetEnvironmentVariableA
InitializeCriticalSection
DeleteCriticalSection
CloseHandle
OpenMutexA
GetVersionExA
GetCurrentProcessId
LeaveCriticalSection
EnterCriticalSection
CreateThread
CreateEventA
WaitForSingleObject
ResumeThread
SetEvent
SuspendThread
DisableThreadLibraryCalls
lstrlenA
MultiByteToWideChar
GetLastError
GetModuleFileNameA
InterlockedIncrement
InterlockedDecrement
ResetEvent
DuplicateHandle
GetCurrentProcess
GetCurrentThreadId
WaitForMultipleObjects
CreateSemaphoreA
ReleaseSemaphore
GetSystemInfo
VirtualAlloc
VirtualFree
FreeLibrary
LoadLibraryA
lstrcpyA
GetProcAddress
GetModuleHandleA
WideCharToMultiByte
GetACP
SetThreadPriority
GetThreadPriority
GetCurrentThread
GetTickCount
SetErrorMode
lstrcmpiA
OutputDebugStringA
SetEnvironmentVariableA
GetVolumeInformationA
GetFileTime
GetSystemDirectoryA
GetTimeZoneInformation
Sleep
WriteFile
CreateFileA
OpenFileMappingA
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
InterlockedExchange
CheckDlgButton
GetSystemMetrics
SetDlgItemInt
SetActiveWindow
wsprintfA
GetDlgItemInt
IsDlgButtonChecked
MsgWaitForMultipleObjects
GetDesktopWindow
GetWindowRect
LoadStringW
LoadStringA
DispatchMessageA
GetQueueStatus
RegisterWindowMessageA
PostThreadMessageA
wvsprintfA
CreateDialogParamA
PeekMessageA
DefWindowProcA
DestroyWindow
ShowWindow
InvalidateRect
MoveWindow
SetWindowLongA
GetWindowLongA
GetDlgItem
SendMessageA
RegEnumValueA
RegCreateKeyA
RegSetValueA
RegSetValueExA
RegOpenKeyExA
RegEnumKeyExA
RegCloseKey
RegDeleteKeyA
RegCreateKeyExA
RegEnumKeyA
RegDeleteValueA
RegQueryValueExA
CoInitialize
CoUninitialize
StringFromGUID2
CoTaskMemFree
CoFreeUnusedLibraries
CoCreateInstance
CoTaskMemAlloc
SysAllocString
SysFreeString
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ