DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
348fbbe57020516cd8481e8dc4a864a2d13c6b375e118c31da398c447d6c4b67_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
348fbbe57020516cd8481e8dc4a864a2d13c6b375e118c31da398c447d6c4b67_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
Target
348fbbe57020516cd8481e8dc4a864a2d13c6b375e118c31da398c447d6c4b67_NeikiAnalytics.exe
Size
20KB
MD5
ae38a741b14f8fadde14b4c6fba4c2d0
SHA1
6a7478eddde18571c6c6d7aecba0c2e1bbc391c5
SHA256
348fbbe57020516cd8481e8dc4a864a2d13c6b375e118c31da398c447d6c4b67
SHA512
61e41e1bcd03a5efcdb7c4b13b70d1d9c96eafcb494a5b44104ffe7adf1407759fdd2182a3fbf964170efd8dbe332df9f241d0bd3525a54dac7354e84d47fa97
SSDEEP
96:woWzeVVgAImc/IGvG+CnygMAk5HIGCxVJ7HB:meVsmcRG+CkAkvIbrB
Checks for missing Authenticode signature.
resource |
---|
348fbbe57020516cd8481e8dc4a864a2d13c6b375e118c31da398c447d6c4b67_NeikiAnalytics.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
EVENT_SINK_GetIDsOfNames
MethCallEngine
EVENT_SINK_Invoke
Zombie_GetTypeInfo
EVENT_SINK2_Release
EVENT_SINK_AddRef
Zombie_GetTypeInfoCount
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord319
EVENT_SINK2_AddRef
ord101
ord102
ord103
ord104
ord105
ord320
ord321
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ