Static task
static1
General
-
Target
03b52be6a4b2b2fc47a32850ca4b6ec0_NeikiAnalytics
-
Size
7KB
-
MD5
03b52be6a4b2b2fc47a32850ca4b6ec0
-
SHA1
c717379c62ac59df2af996334b000729752eb939
-
SHA256
eada24f18e8772cc98666fd17ea3da8e0e7231bc45c01c8579333261fda220e0
-
SHA512
249eda3eeb7bd4388f53b4a9a4afe6a2ca2f7c720066ea0c33c92d6db873fe1c356071ada994066e94760825108a2648afdff5590a7911ff8e879a08715075f0
-
SSDEEP
96:WOUX7iM7gmmo6KXQdv8evxmn/jOUX7iM7gmmo6KXQdv8evxmn/w:yXm/UQ5pvxCrXm/UQ5pvxCo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03b52be6a4b2b2fc47a32850ca4b6ec0_NeikiAnalytics
Files
-
03b52be6a4b2b2fc47a32850ca4b6ec0_NeikiAnalytics.sys windows:5 windows x86 arch:x86
0b2b31875684a2b950ecdad61d264882
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
DbgPrint
IofCompleteRequest
IoDeleteDevice
IoDeleteSymbolicLink
ObfDereferenceObject
KeWaitForSingleObject
IofCallDriver
IoBuildDeviceIoControlRequest
KeInitializeEvent
IoGetDeviceObjectPointer
ExAllocatePoolWithTag
ExFreePool
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 160B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 448B - Virtual size: 442B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 160B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ