GetAppDirHash_tt
GetCpuFeature_tt
GetNonTemporalDataSizeMin_tt
_undo_it@0
memset_nontemporal_tt
Static task
static1
Behavioral task
behavioral1
Sample
18567b1667920341a95e0bd4d967b0f3a96aaba05a0b816c99b9d585d66250a2_NeikiAnalytics.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
18567b1667920341a95e0bd4d967b0f3a96aaba05a0b816c99b9d585d66250a2_NeikiAnalytics.dll
Resource
win10v2004-20240226-en
Target
18567b1667920341a95e0bd4d967b0f3a96aaba05a0b816c99b9d585d66250a2_NeikiAnalytics.exe
Size
83KB
MD5
b6cbf740ab29cf3e2b263660582e0200
SHA1
80e28551f3e31d80bb3e3d2c536af7426441e75e
SHA256
18567b1667920341a95e0bd4d967b0f3a96aaba05a0b816c99b9d585d66250a2
SHA512
a6b7f478f46a9406916d1084b163da87417812de5e8748a8ffa1f4a874d834a268331abecb1e967381b574e850c869a2610a348abe5411d9f21b5f75820a1bf3
SSDEEP
1536:rapMJHPQ40lsXZC2Wu8BaN6PU8SeV5omIbEvFwEHP:JYLyC2WnB9meV5omIKFwE
Checks for missing Authenticode signature.
resource |
---|
18567b1667920341a95e0bd4d967b0f3a96aaba05a0b816c99b9d585d66250a2_NeikiAnalytics.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
AreFileApisANSI
CloseHandle
CopyFileW
CreateDirectoryW
CreateFileMappingW
CreateFileW
CreateProcessW
CreateToolhelp32Snapshot
CreateWaitableTimerW
DeleteFileW
DisableThreadLibraryCalls
ExpandEnvironmentStringsW
FlushInstructionCache
FreeLibrary
GetCommandLineW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentVariableW
GetFileAttributesW
GetLastError
GetModuleFileNameW
GetModuleHandleExW
GetModuleHandleW
GetPriorityClass
GetProcAddress
GetProcessHeap
GetProcessId
GetSystemDefaultLCID
GetSystemTimeAsFileTime
GetSystemTimes
GetThreadContext
GetTickCount
GlobalAddAtomW
GlobalDeleteAtom
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
InitializeSListHead
IsDebuggerPresent
IsProcessorFeaturePresent
IsWow64Process
LoadLibraryExW
LoadLibraryW
LocalFree
MoveFileExW
MultiByteToWideChar
OpenFileMappingW
OpenProcess
OpenThread
Process32FirstW
Process32NextW
QueryPerformanceCounter
ReadFile
ResumeThread
SetDllDirectoryW
SetFilePointer
SetLastError
SetPriorityClass
SetThreadContext
SetUnhandledExceptionFilter
SetWaitableTimer
Sleep
SleepEx
SuspendThread
TerminateProcess
Thread32First
Thread32Next
UnhandledExceptionFilter
VirtualAlloc
VirtualAllocEx
VirtualFree
VirtualFreeEx
VirtualProtect
VirtualProtectEx
VirtualQuery
WideCharToMultiByte
WriteProcessMemory
CommandLineToArgvW
ord28
PathAppendW
PathCombineW
PathFileExistsW
PathFindFileNameW
PathMatchSpecA
PathMatchSpecW
PathRemoveBackslashW
PathRemoveFileSpecW
StrChrW
StrStrIW
wnsprintfA
wnsprintfW
CallNextHookEx
DispatchMessageW
EnumWindows
FindWindowExW
FindWindowW
GetAsyncKeyState
GetClassNameW
GetClientRect
GetDoubleClickTime
GetForegroundWindow
GetMessageW
GetWindowThreadProcessId
IsIconic
IsWindowVisible
PostMessageW
PtInRect
RegisterHotKey
SendInput
SetWindowPos
SetWindowsHookExW
ShowWindow
TrackMouseEvent
TranslateMessage
UnhookWindowsHookEx
UnregisterHotKey
WindowFromPoint
CoCreateInstance
CoInitialize
CoTaskMemAlloc
CoUninitialize
__std_type_info_destroy_list
_except_handler4_common
memcpy
memmove
memset
strchr
strrchr
strstr
wcschr
wcsrchr
_beginthreadex
_cexit
_configure_narrow_argv
_execute_onexit_table
_initialize_narrow_environment
_initialize_onexit_table
_initterm
_initterm_e
_seh_filter_dll
__stdio_common_vsprintf
__stdio_common_vsscanf
_chsize
_fileno
_wfopen
fclose
feof
fgets
fread
fseek
ftell
fwrite
_strdup
_stricmp
_wcsicmp
_wcsnicmp
strcmp
strcpy
strlen
strncat
strncmp
strncpy
tolower
wcscmp
wcscpy
wcslen
wcsncat
wcsncpy
_strtoui64
_ui64tow
atoi
strtod
wcstol
_time64
_waccess
_wfullpath
_wgetenv
_wputenv
calloc
free
malloc
realloc
GetAppDirHash_tt
GetCpuFeature_tt
GetNonTemporalDataSizeMin_tt
_undo_it@0
memset_nontemporal_tt
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ