Static task
static1
General
-
Target
5024b4bbfb17bc3f5225603ffe599fe0_NeikiAnalytics.exe
-
Size
15KB
-
MD5
5024b4bbfb17bc3f5225603ffe599fe0
-
SHA1
9bd89fccfe7645d1dbc23f70da6a803314e368b7
-
SHA256
f28f7308c4c1433bed7df2a25ccd62c0e01ee28eacd6093f9aeb0a6e4706e0eb
-
SHA512
b4f27f55d90cf06c9e79953055c53d1e41bf9de3bd2a89348edd736b0e514be69165e40aecad2f1cc3919066d0bda768eb7de2af851e3e58082b6c573f8c9652
-
SSDEEP
192:ahhg02pEAd2LpeA4YcHYL69ngNyby2sE9jBF3A5K+oNYHk4iA:aPNk8VD454GqNyb8E9VF3AM+oAk3A
Malware Config
Signatures
Files
-
5024b4bbfb17bc3f5225603ffe599fe0_NeikiAnalytics.exe.sys windows:10 windows x64 arch:x64
e2ac365d3a6eaf494eed25fc8a4bb272
Code Sign
7c:01:36:2c:b8:51:34:ae:47:3f:01:59:ab:50:4b:b4Certificate
IssuerCN=Microsoft WindowsNot Before06/05/2024, 07:10Not After07/05/2034, 07:10SubjectCN=Microsoft Windows0e:9b:18:8e:f9:d0:2d:e7:ef:db:50:e2:08:40:18:5aCertificate
IssuerCN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before01/08/2022, 00:00Not After09/11/2031, 23:59SubjectCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
07:36:37:b7:24:54:7c:d8:47:ac:fd:28:66:2a:5e:5bCertificate
IssuerCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before23/03/2022, 00:00Not After22/03/2037, 23:59SubjectCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
05:44:af:f3:94:9d:08:39:a6:bf:db:3f:5f:e5:61:16Certificate
IssuerCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USNot Before14/07/2023, 00:00Not After13/10/2034, 23:59SubjectCN=DigiCert Timestamp 2023,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
62:ba:91:95:2c:29:02:26:eb:aa:78:11:f5:58:2e:73:04:37:e2:db:83:9f:c6:24:d3:29:04:39:01:ce:fc:ecSigner
Actual PE Digest62:ba:91:95:2c:29:02:26:eb:aa:78:11:f5:58:2e:73:04:37:e2:db:83:9f:c6:24:d3:29:04:39:01:ce:fc:ecDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
C:\Users\Administrator\Desktop\project da komaru\komaru\x64\Release\driver.pdb
Imports
ntoskrnl.exe
RtlInitUnicodeString
RtlGetVersion
MmUnmapIoSpace
MmMapIoSpaceEx
IofCompleteRequest
IoCreateDevice
IoCreateSymbolicLink
IoDeleteDevice
IoDeleteSymbolicLink
ObfDereferenceObject
MmCopyMemory
KeStackAttachProcess
KeUnstackDetachProcess
PsLookupProcessByProcessId
IoCreateDriver
PsGetProcessSectionBaseAddress
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 196B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 264B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 1024B - Virtual size: 544B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ