_MainWndProc@16
_StubFileWrite@12
Static task
static1
Behavioral task
behavioral1
Sample
1ab3f642e2add359c831d7f745b157cf3009654db4c1e0087e90bc055863a0a3_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1ab3f642e2add359c831d7f745b157cf3009654db4c1e0087e90bc055863a0a3_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
Target
1ab3f642e2add359c831d7f745b157cf3009654db4c1e0087e90bc055863a0a3_NeikiAnalytics.exe
Size
390KB
MD5
30a75c064fd6403fb9afa3be3188abd0
SHA1
81fbea81fd3250ee597d855acd48686da8407a7b
SHA256
1ab3f642e2add359c831d7f745b157cf3009654db4c1e0087e90bc055863a0a3
SHA512
3710ec88d87481946f86506f3607157d155e61b228c3177c281bf2776bab768350e316869e6369301313b3364440ae7e4a958c6334027f4ad9cde345e1882339
SSDEEP
12288:AiWlLzQtygUVWN1uV74QIUataHs7XzQik/8L:rszQ8xV2YV71IUiqs7zQtI
Checks for missing Authenticode signature.
resource |
---|
1ab3f642e2add359c831d7f745b157cf3009654db4c1e0087e90bc055863a0a3_NeikiAnalytics.exe |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
FreeLibrary
OpenFile
LoadLibraryA
_lclose
_lopen
lstrcpyA
_lcreat
GetModuleFileNameA
GetVersionExA
SetErrorMode
lstrlenA
GetWindowsDirectoryA
GlobalHandle
_lwrite
WinExec
GlobalAlloc
GlobalFree
ExitProcess
_lread
_llseek
GlobalUnlock
GetCommandLineA
GetModuleHandleA
GlobalLock
GetClientRect
DefWindowProcA
SendMessageA
EndPaint
BeginPaint
InvalidateRect
PostQuitMessage
wsprintfA
CreateWindowExA
GetDC
ReleaseDC
SetWindowPos
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
ExitWindowsEx
MessageBoxA
RegisterClassA
CreatePalette
DeleteObject
GetStockObject
GetDeviceCaps
PatBlt
CreateSolidBrush
SelectObject
SelectPalette
RealizePalette
_MainWndProc@16
_StubFileWrite@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ