c:\jenkins\workspace\8-2-build-windows-amd64-cygwin\jdk8u261\295\build\windows-amd64\deploy\tmp\ssvagent\obj64\ssvagent.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a6e77d1204f14b57ef112849a1c4f03b1eae47e0497a7428be61cb39511d9e64_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a6e77d1204f14b57ef112849a1c4f03b1eae47e0497a7428be61cb39511d9e64_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
a6e77d1204f14b57ef112849a1c4f03b1eae47e0497a7428be61cb39511d9e64_NeikiAnalytics.exe
-
Size
656KB
-
MD5
e97c728d200299af04c007726481e7a0
-
SHA1
4c84da5b605a82851bd6c0779342d29ef624de8e
-
SHA256
a6e77d1204f14b57ef112849a1c4f03b1eae47e0497a7428be61cb39511d9e64
-
SHA512
f90c064e0e6101f02a0303b6d9dd9abdf3fdcf326481a8829ce28aef214f62633722c927ad4ec0a238e2cc7cc132a6a6e71c885c95fd9a009b2dde777af145f2
-
SSDEEP
12288:UzhPpPNggYmblFCFi/znVKzVqQ4RWUeKd2P4AwJ2DUkyyGYoWWfK+1:gqgYIZVGV0UUTsW2DnyyNaK+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a6e77d1204f14b57ef112849a1c4f03b1eae47e0497a7428be61cb39511d9e64_NeikiAnalytics.exe
Files
-
a6e77d1204f14b57ef112849a1c4f03b1eae47e0497a7428be61cb39511d9e64_NeikiAnalytics.exe.exe windows:6 windows x64 arch:x64
04dad0d9160a29c2376e115698d32c57
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
RaiseException
GetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
FreeLibrary
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
LoadLibraryExW
LoadResource
SizeofResource
FindResourceW
LoadLibraryW
lstrcmpiW
MultiByteToWideChar
VerSetConditionMask
GetEnvironmentVariableW
CreateFileW
GetLongPathNameW
GetShortPathNameW
GetTempPathW
CloseHandle
WaitForSingleObject
GetCurrentProcess
CreateProcessW
OpenProcess
GlobalMemoryStatusEx
GetLocalTime
GetSystemDirectoryW
GetWindowsDirectoryW
GetVersionExW
GetNativeSystemInfo
GlobalAlloc
GlobalFree
LocalAlloc
LocalFree
FormatMessageW
lstrlenW
VerifyVersionInfoW
WTSGetActiveConsoleSessionId
OutputDebugStringW
GetCurrentProcessId
GetCurrentThreadId
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
LoadLibraryExA
VirtualQuery
VirtualProtect
GetSystemInfo
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
RtlCaptureContext
user32
GetWindowThreadProcessId
GetShellWindow
CharNextW
wsprintfW
OpenInputDesktop
CloseDesktop
ole32
CoTaskMemAlloc
CoTaskMemRealloc
StringFromCLSID
CoTaskMemFree
CoCreateInstance
oleaut32
SysAllocStringByteLen
VarUI4FromStr
SysAllocString
SysStringLen
VariantClear
SysFreeString
vcruntime140
__C_specific_handler
__std_exception_copy
__std_exception_destroy
wcsstr
memcpy
__CxxFrameHandler3
memset
_CxxThrowException
api-ms-win-crt-runtime-l1-1-0
_cexit
_seh_filter_exe
_set_app_type
_configure_wide_argv
_get_wide_winmain_command_line
_initterm
_initterm_e
_crt_atexit
_exit
_invalid_parameter_noinfo
_c_exit
_register_thread_local_exe_atexit_callback
_errno
__p___argc
__p___wargv
_register_onexit_function
terminate
_initialize_wide_environment
exit
_initialize_onexit_table
api-ms-win-crt-string-l1-1-0
wcscat_s
wcscmp
_wcsicmp
wcscpy_s
wcsncpy_s
api-ms-win-crt-heap-l1-1-0
_callnewh
malloc
_recalloc
_set_new_mode
free
api-ms-win-crt-convert-l1-1-0
_wtoi
api-ms-win-crt-filesystem-l1-1-0
_wsplitpath_s
_wstat64i32
api-ms-win-crt-environment-l1-1-0
_wdupenv_s
_wputenv
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
_wfopen_s
__stdio_common_vsnwprintf_s
fclose
__stdio_common_vswprintf_s
__stdio_common_vfwprintf_s
api-ms-win-crt-time-l1-1-0
wcsftime
_localtime64
_ftime64_s
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE