?GetDesktopListView2@@YGPAUHWND__@@PAH@Z
?GetDesktopListView3@@YGPAUHWND__@@PAH@Z
?GetDesktopListView@@YGPAUHWND__@@PAH@Z
?RefreshDesktop@@YGHH@Z
?SetItemColors@@YGHH@Z
?SetupHook@@YGHH@Z
Static task
static1
Behavioral task
behavioral1
Sample
3a78d4f164e13bc787208e76768bdac7671d4ca683af9f93b963246d7b27f81c_NeikiAnalytics.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
3a78d4f164e13bc787208e76768bdac7671d4ca683af9f93b963246d7b27f81c_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
Target
3a78d4f164e13bc787208e76768bdac7671d4ca683af9f93b963246d7b27f81c_NeikiAnalytics.exe
Size
129KB
MD5
06b2431fc0261f1bde9ebef4b0b54780
SHA1
94229266af583d80b6d57300c4f217dab7a89a4e
SHA256
3a78d4f164e13bc787208e76768bdac7671d4ca683af9f93b963246d7b27f81c
SHA512
fed5ac80758973c2e1d64c649433ded6ca67edf6016650fa039ecad3a9d92c1095b756f70227ea7241b934a5bedad8ed5f3894339b56d29c56f4b5c84f312c52
SSDEEP
1536:aqZj1SgiLuhh17G4gMTsuPaEsKIr8GGdFlXB+Xce1NsWjcdSPCEpc8WLX31mGuJZ:aev6rUHIofx+91ySPHpc8Wb1WJ
Checks for missing Authenticode signature.
resource |
---|
3a78d4f164e13bc787208e76768bdac7671d4ca683af9f93b963246d7b27f81c_NeikiAnalytics.exe |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcmpW
GetCurrentThreadId
DeleteCriticalSection
EnterCriticalSection
GetStartupInfoW
LeaveCriticalSection
InitializeCriticalSection
CreateFileW
GetModuleFileNameW
SetFilePointerEx
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
LoadLibraryW
OutputDebugStringW
HeapReAlloc
LoadLibraryExW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameA
GetFileType
CloseHandle
ReleaseMutex
WriteConsoleW
GetProcessHeap
LCMapStringW
InterlockedIncrement
InterlockedDecrement
Sleep
EncodePointer
DecodePointer
MultiByteToWideChar
GetACP
GetCommandLineA
RaiseException
RtlUnwind
InitializeCriticalSectionAndSpinCount
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetProcAddress
GetLastError
HeapFree
IsDebuggerPresent
IsProcessorFeaturePresent
HeapAlloc
ExitProcess
GetModuleHandleExW
HeapSize
GetStdHandle
WriteFile
GetCPInfo
IsValidCodePage
GetOEMCP
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStringTypeW
GetModuleHandleW
EnumWindows
GetWindow
EnumChildWindows
GetDesktopWindow
GetClassNameW
GetParent
MessageBoxW
RegisterWindowMessageW
UnhookWindowsHookEx
GetWindowThreadProcessId
SetWindowsHookExW
LoadStringW
FindWindowW
PostMessageW
GetSysColor
SendMessageW
CallNextHookEx
SHChangeNotify
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
?GetDesktopListView2@@YGPAUHWND__@@PAH@Z
?GetDesktopListView3@@YGPAUHWND__@@PAH@Z
?GetDesktopListView@@YGPAUHWND__@@PAH@Z
?RefreshDesktop@@YGHH@Z
?SetItemColors@@YGHH@Z
?SetupHook@@YGHH@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ