C:\Documents and Settings\Administrator\Desktop\shlexc\out\release\zanclxjdx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3703e1119d47e1e92cda5a0490c8b414358cc316fa262914971f0f6a0eed04bb_NeikiAnalytics.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
3703e1119d47e1e92cda5a0490c8b414358cc316fa262914971f0f6a0eed04bb_NeikiAnalytics.dll
Resource
win10v2004-20240611-en
General
-
Target
3703e1119d47e1e92cda5a0490c8b414358cc316fa262914971f0f6a0eed04bb_NeikiAnalytics.exe
-
Size
5.5MB
-
MD5
1708967e3529669eb71ca75cb43920f0
-
SHA1
29938b1b6156fb0c7634e96a6d8d9068e881362a
-
SHA256
3703e1119d47e1e92cda5a0490c8b414358cc316fa262914971f0f6a0eed04bb
-
SHA512
77e09342061600009d19361673a90a4f5206fe358244e6d9cc1e0bb2d28837386de4dbe87e56a27d6a57831f5316a186e3fd147cca997916057f559ecb913c84
-
SSDEEP
98304:/uFMHazOVmnATcyIKLWCibi7oCyE113zyYE4iaqy2QoT8HP:wMCOVmn0IKLgbEHjR3q1QC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3703e1119d47e1e92cda5a0490c8b414358cc316fa262914971f0f6a0eed04bb_NeikiAnalytics.exe
Files
-
3703e1119d47e1e92cda5a0490c8b414358cc316fa262914971f0f6a0eed04bb_NeikiAnalytics.exe.dll windows:5 windows x86 arch:x86
f6d3109c3c2e8e78c1ac7080af0ffba2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetTickCount
ReadConsoleOutputA
WideCharToMultiByte
LoadLibraryW
GetConsoleWindow
ReadFile
GetModuleFileNameW
CreateFileW
lstrcmpW
CreateJobObjectA
GetFileSizeEx
GetStdHandle
CreateConsoleScreenBuffer
GetTempFileNameA
OpenMutexA
GetConsoleScreenBufferInfo
SetEnvironmentVariableA
ConvertDefaultLocale
lstrcatW
VirtualProtect
CloseHandle
GetComputerNameW
CreateThread
IsProcessorFeaturePresent
WriteConsoleW
SetStdHandle
HeapReAlloc
HeapSize
RtlUnwind
GetStringTypeW
MultiByteToWideChar
LCMapStringW
LeaveCriticalSection
EnterCriticalSection
SetHandleInformation
GetEnvironmentStringsW
GetCurrentProcess
SetEnvironmentVariableW
lstrlenA
FillConsoleOutputCharacterA
GetCommandLineW
GetTempPathA
ExitProcess
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapAlloc
GetCurrentThreadId
DecodePointer
GetCommandLineA
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLastError
HeapFree
EncodePointer
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetProcAddress
WriteFile
HeapCreate
HeapDestroy
Sleep
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
user32
SetCursor
GetWindowRect
LoadStringA
DialogBoxParamW
IsClipboardFormatAvailable
GetGuiResources
wsprintfA
FindWindowW
CharUpperBuffA
GetWindowTextW
LoadCursorFromFileW
GetDlgItem
EndDialog
GetDesktopWindow
GetSysColor
PostMessageA
SetWindowTextA
MoveWindow
IsDialogMessageA
gdi32
CreateDCA
CreateBrushIndirect
SetTextColor
advapi32
IsTextUnicode
GetUserNameW
OpenProcessToken
DuplicateTokenEx
shlwapi
StrRChrIA
PathRemoveFileSpecW
Exports
Exports
JnZzaAmNzlLxjVHL
jmweczbxcvjsi
migjtsuukjvt
pzvmkcouyvqk
vyhbiozzrw
zjjcrmbehoakm
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 5.4MB - Virtual size: 5.4MB
IMAGE_SCN_MEM_READ