@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
Static task
static1
Behavioral task
behavioral1
Sample
4f7b14fa49dcecff0b0f579fbe44e9d9cd84a900f03b69d4dbcefd285ae33a80_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4f7b14fa49dcecff0b0f579fbe44e9d9cd84a900f03b69d4dbcefd285ae33a80_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Target
4f7b14fa49dcecff0b0f579fbe44e9d9cd84a900f03b69d4dbcefd285ae33a80_NeikiAnalytics.exe
Size
312KB
MD5
cbcf0d45b1aa78a5146899aa221040c0
SHA1
4245443e586414c31dff5c23ced9613f7d423951
SHA256
4f7b14fa49dcecff0b0f579fbe44e9d9cd84a900f03b69d4dbcefd285ae33a80
SHA512
dd8d02b945d38213db85e3f5e190e691dee61e17c729435f53722055a96448b85def974d1f2dffb608ece532d956c05641688cc8b45ef7413e980b91f62c1a47
SSDEEP
3072:+56O9F/X6AuKWBUlVugUmVYwOjcjnFbyGTzPmVfQU:K6O9FPZokENjMnF3TzPmSU
Checks for missing Authenticode signature.
resource |
---|
4f7b14fa49dcecff0b0f579fbe44e9d9cd84a900f03b69d4dbcefd285ae33a80_NeikiAnalytics.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
VirtualAlloc
UnhandledExceptionFilter
WriteFile
VirtualFree
GetStdHandle
GlobalFree
GetStartupInfoA
IsDBCSLeadByte
ExitProcess
FindResourceA
GlobalAlloc
GlobalUnlock
GlobalLock
GetCurrentThreadId
GetExitCodeProcess
GetFileAttributesA
EnterCriticalSection
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
FreeResource
GetCommandLineA
GetVersion
CloseHandle
CreateFileA
GetEnvironmentStrings
GlobalMemoryStatus
GlobalHandle
CreateProcessA
InitializeCriticalSection
LoadResource
LeaveCriticalSection
GetFileType
LockResource
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SizeofResource
SleepEx
RegOpenKeyExA
SetSecurityDescriptorDacl
RegQueryValueExA
RegCloseKey
InitializeSecurityDescriptor
StretchDIBits
SetStretchBltMode
SelectPalette
RealizePalette
CreatePalette
LoadCursorA
GetDesktopWindow
GetClientRect
EnumThreadWindows
EndPaint
DispatchMessageA
DefWindowProcA
CreateWindowExA
LoadStringA
BeginPaint
wsprintfA
UpdateWindow
ShowWindow
SetWindowTextA
RegisterClassA
PostQuitMessage
WaitForInputIdle
PeekMessageA
MessageBoxA
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE