c:\ade\jenkins\workspace\8-2-build-windows-i586-cygwin\jdk8u241\331\build\windows-i586\deploy\tmp\javacplexec\obj\javacpl.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2800f5d93bbf919a65a6bcc57bd09a70_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
2800f5d93bbf919a65a6bcc57bd09a70_NeikiAnalytics
-
Size
269KB
-
MD5
2800f5d93bbf919a65a6bcc57bd09a70
-
SHA1
54db0b1727c7ef7391ab7159c205957de9c3f083
-
SHA256
a1c955e5a0b22530c877d4963f26f44e2cb16367d9afea436f3a78b2c4101c78
-
SHA512
04c89e22901fb1b0aa7273a542719606c6ab172c9c30a0a1423936ac875e88365395c9308053c3dbeadd608c7157e2fb7472df11b8592f3508f81ad666e45f31
-
SSDEEP
6144:R9OkuvvaB9tUliXnL1jiYR1fwhEN/tx133r1SPE34i1MbA:RsvvaB7ZXnL1jiYRRwhGtn71SPEIfA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2800f5d93bbf919a65a6bcc57bd09a70_NeikiAnalytics
Files
-
2800f5d93bbf919a65a6bcc57bd09a70_NeikiAnalytics.exe windows:5 windows x86 arch:x86
791f68585bac50f43e44b43bc017494d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
GetWindowThreadProcessId
LoadStringW
wsprintfW
GetShellWindow
MessageBoxW
OpenInputDesktop
CloseDesktop
msvcr100
_unlock
__dllonexit
_lock
_onexit
_invoke_watson
_controlfp_s
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
?terminate@@YAXXZ
memcpy
_vsnwprintf_s
_ftime64_s
wcsftime
_snwprintf_s
_localtime64
_wputenv
fwprintf_s
_wdupenv_s
free
_wfopen_s
wcsncpy_s
wcscat_s
memcpy_s
_wsplitpath_s
fclose
wcscpy_s
_wtoi
_wcsicmp
_wstat64i32
memset
swprintf_s
??_U@YAPAXI@Z
__CxxFrameHandler3
??3@YAXPAX@Z
_stat64i32
??_V@YAXPAX@Z
??2@YAPAXI@Z
malloc
_except_handler4_common
_CxxThrowException
kernel32
GetProcAddress
QueryPerformanceCounter
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
RaiseException
LoadLibraryA
DecodePointer
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
EncodePointer
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
Sleep
InterlockedExchange
GetCurrentThreadId
GetCurrentProcessId
OutputDebugStringW
OpenProcess
GetLocalTime
GetTempPathW
GetShortPathNameW
WTSGetActiveConsoleSessionId
LocalAlloc
GetWindowsDirectoryW
lstrlenW
WaitForSingleObject
CreateProcessW
GetSystemDirectoryW
CreateFileW
GlobalAlloc
LocalFree
GlobalFree
GetNativeSystemInfo
GetCurrentProcess
VerSetConditionMask
VerifyVersionInfoW
GetVersionExW
GlobalMemoryStatusEx
InterlockedIncrement
GetModuleHandleW
GetModuleFileNameW
GetLongPathNameW
LoadLibraryW
GetLastError
GetSystemTimeAsFileTime
FreeLibrary
CloseHandle
InterlockedDecrement
FormatMessageW
GetEnvironmentVariableW
GetTickCount
ole32
StringFromCLSID
CoTaskMemFree
oleaut32
VariantClear
SysAllocString
SysFreeString
SysStringLen
SysAllocStringByteLen
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 205KB - Virtual size: 208KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ