c:\jenkins\workspace\8-2-build-windows-amd64-cygwin\jdk8u261\295\build\windows-amd64\deploy\jre-image\bin\javaws.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e868dffd00be9c2fe307d6ed48fe7d40_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
e868dffd00be9c2fe307d6ed48fe7d40_NeikiAnalytics.exe
-
Size
1.7MB
-
MD5
e868dffd00be9c2fe307d6ed48fe7d40
-
SHA1
0c26f02ecb44c2f098363d1ef02445739fcc90d6
-
SHA256
b057638577b77e364c2a098822f62dd23e95c7b1583c6463c86132dc97bcbedc
-
SHA512
a00c67bf54a0c129b3588a1023156f7a6a64fba01a36415e66980debb1de45791672df276898b42ddff23a2e24a202f7583f77c5810341d292f2f6c89e4cf1a4
-
SSDEEP
24576:rDMS76huDyqDRVldlnXfH9gPwCn7vOb7HHcp/CGXQp:rDMi6tgRVlbnXf9gPTTW7H1GXC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e868dffd00be9c2fe307d6ed48fe7d40_NeikiAnalytics.exe
Files
-
e868dffd00be9c2fe307d6ed48fe7d40_NeikiAnalytics.exe.exe windows:6 windows x64 arch:x64
ed3c2cf4a30e2437502a5d05e29f059d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetCurrentProcessId
WideCharToMultiByte
FreeLibrary
GetModuleHandleW
GetProcAddress
LoadLibraryW
CreateDirectoryW
FindClose
FindFirstFileW
CloseHandle
WaitForSingleObject
CreateEventW
OpenProcess
GetTickCount
GetSystemWindowsDirectoryW
GetModuleFileNameW
GetThreadLocale
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
VerSetConditionMask
GetEnvironmentVariableW
CreateFileW
GetLongPathNameW
GetShortPathNameW
GetTempPathW
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetCurrentProcess
CreateProcessW
GlobalMemoryStatusEx
GetLocalTime
GetSystemDirectoryW
GetWindowsDirectoryW
GetVersionExW
GetNativeSystemInfo
GlobalAlloc
GlobalFree
LocalAlloc
LocalFree
FormatMessageW
lstrlenW
VerifyVersionInfoW
WTSGetActiveConsoleSessionId
OutputDebugStringW
GetCurrentThreadId
GetExitCodeProcess
GetModuleHandleExW
GetFileAttributesW
WriteConsoleW
HeapSize
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
GetFileSizeEx
GetFileAttributesExW
SetFilePointerEx
ReadConsoleW
ReadFile
SetEndOfFile
HeapReAlloc
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetFullPathNameW
GetCurrentDirectoryW
SetEnvironmentVariableW
HeapAlloc
HeapFree
GetStringTypeW
WriteFile
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
RtlUnwindEx
RtlPcToFileHeader
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
ExitProcess
GetCommandLineA
GetCommandLineW
DeleteFileW
GetTimeZoneInformation
GetStdHandle
user32
GetMessageW
TranslateMessage
MessageBoxW
CloseDesktop
DispatchMessageW
DefWindowProcW
RegisterClassW
CreateWindowExW
SetTimer
LoadCursorW
wsprintfW
OpenInputDesktop
GetWindowThreadProcessId
GetShellWindow
ole32
CoTaskMemFree
StringFromCLSID
oleaut32
VariantClear
SysAllocString
SysFreeString
SysStringLen
SysAllocStringByteLen
wsock32
WSAAsyncSelect
socket
send
ntohs
listen
ioctlsocket
htons
getsockname
accept
recv
bind
closesocket
WSAStartup
WSAGetLastError
connect
Sections
.text Size: 254KB - Virtual size: 254KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE