E:\Application Developement\P\W\Libertix Keylogger\LEM\lkl-office\Release\ProcessVDLL.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5b6ee568bb838589808d7acb33ec0f00_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5b6ee568bb838589808d7acb33ec0f00_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
5b6ee568bb838589808d7acb33ec0f00_NeikiAnalytics
-
Size
85KB
-
MD5
5b6ee568bb838589808d7acb33ec0f00
-
SHA1
046e82ca8fd9fa354a378aeda3a4c1179ef1eb66
-
SHA256
5a7475885a3261166ef1c107fc1043426cd3c5619ddbc5bf0d814930361db5dd
-
SHA512
439b82e3c54adb9590110ad05b61bd5de5a14d9fa558058c1d02c660471190dd906bbfecdd9baf9617be47411dd0f2b6e6571c101220b2ce3ecf22ced448366b
-
SSDEEP
1536:EoSzx4Lel4d3lV9JC41hj6N/7yC7mjUAthdr5t660eWkJRwFQw:0x8KglV9JFj6NEt6jPkJ+FQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5b6ee568bb838589808d7acb33ec0f00_NeikiAnalytics
Files
-
5b6ee568bb838589808d7acb33ec0f00_NeikiAnalytics.dll windows:6 windows x86 arch:x86
774b56845b680a0203b48a9fa92e9e09
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
LocalAlloc
LocalFree
GlobalDeleteAtom
GlobalAddAtomW
CreateFileMappingW
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
CreateEventW
CreateThread
SuspendThread
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
GetCurrentProcess
OpenProcess
DisableThreadLibraryCalls
GetCurrentThread
GlobalFindAtomW
GetProcAddress
GetFinalPathNameByHandleW
ResetEvent
Sleep
GetCurrentThreadId
ExitThread
EnterCriticalSection
SetLastError
TerminateProcess
VirtualProtectEx
VirtualQueryEx
VirtualProtect
VirtualQuery
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualAlloc
VirtualFree
GetSystemTimeAsFileTime
QueryPerformanceCounter
IsDebuggerPresent
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
DeleteCriticalSection
InitializeCriticalSection
WriteFile
CloseHandle
CreateFileW
GetTempPathW
GetCurrentProcessId
LeaveCriticalSection
GetModuleFileNameW
GetModuleHandleW
CreateDirectoryW
GetLocalTime
GetLastError
InitializeSListHead
user32
IsWindow
SendMessageW
GetParent
UnhookWindowsHookEx
IsWindowVisible
FindWindowW
UnhookWinEvent
GetWindowRect
GetDesktopWindow
GetDC
ReleaseDC
GetWindowThreadProcessId
FindWindowExW
PeekMessageW
GetClientRect
SetWinEventHook
CallNextHookEx
GetClassNameW
SetWindowsHookExW
gdi32
DeleteObject
DeleteDC
CreateCompatibleBitmap
SelectObject
BitBlt
CreateCompatibleDC
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
CryptReleaseContext
CryptAcquireContextW
CryptGenRandom
ole32
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
oleaut32
VariantClear
SysFreeString
SysStringLen
VariantInit
msvcp140
?_Xlength_error@std@@YAXPBD@Z
gdiplus
GdipDisposeImage
GdiplusShutdown
GdiplusStartup
GdipAlloc
GdipFree
GdipCloneImage
GdipCreateBitmapFromHBITMAP
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipSaveImageToStream
GdipSaveImageToFile
oleacc
AccessibleObjectFromEvent
psapi
GetProcessImageFileNameW
shlwapi
PathIsURLW
vcruntime140
wcsrchr
__std_type_info_destroy_list
_CxxThrowException
__std_exception_destroy
__std_exception_copy
_except_handler4_common
memset
memcpy
wcschr
__CxxFrameHandler3
__std_terminate
wcsstr
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vswprintf
api-ms-win-crt-string-l1-1-0
wcsncmp
iswdigit
_wcsicmp
strcmp
_wcsrev
api-ms-win-crt-heap-l1-1-0
malloc
free
_callnewh
api-ms-win-crt-convert-l1-1-0
_wtol
_wtoi
api-ms-win-crt-runtime-l1-1-0
_crt_atexit
_execute_onexit_table
_initterm_e
_cexit
_register_onexit_function
_initterm
_initialize_onexit_table
_initialize_narrow_environment
_beginthreadex
_configure_narrow_argv
_seh_filter_dll
Exports
Exports
??0InterceptProc@@QAE@PAX@Z
??4InterceptProc@@QAEAAV0@$$QAV0@@Z
??4InterceptProc@@QAEAAV0@ABV0@@Z
?IP_DLL_PROCESS_ATTACH@InterceptProc@@QAEXPAPAXPAX@Z
?IP_DLL_PROCESS_DETACH@InterceptProc@@QAEXXZ
?IP_DetourIsHelperProcess@InterceptProc@@QAEHXZ
ProcessVDLL_RequestIntroduceInjection
ProcessVDLL_RequestRemoveInjection
Sections
.text Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 968B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ