Static task
static1
General
-
Target
34fbad22fa0b495777a06d5c61b6b73099955199a69ff4c1b4d1c6c42149fa6a_NeikiAnalytics.exe
-
Size
775KB
-
MD5
7d539cde5e424ed51470359a2ac241e0
-
SHA1
2ad26c144f98b6af80276539789a17aef721c4b4
-
SHA256
34fbad22fa0b495777a06d5c61b6b73099955199a69ff4c1b4d1c6c42149fa6a
-
SHA512
e6fdaf0652fb66fbe1db94f3c3a8f0e25dd6ce4cc14b469198a985c1c372084d887e4998f8df9949a3f61632ca2f4f3dbb1855400ec6b24e7f316b027b24823a
-
SSDEEP
24576:WycVbx0lUFjhDBL+lM8Q607KinoF8ElLe:aFlFjhsGj605nDGL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 34fbad22fa0b495777a06d5c61b6b73099955199a69ff4c1b4d1c6c42149fa6a_NeikiAnalytics.exe
Files
-
34fbad22fa0b495777a06d5c61b6b73099955199a69ff4c1b4d1c6c42149fa6a_NeikiAnalytics.exe.sys windows:6 windows x86 arch:x86
c72bf581813b95a342e68c2ed56960ac
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
_wcslwr
IoAllocateMdl
MmProbeAndLockPages
MmMapLockedPagesSpecifyCache
MmUnlockPages
IoFreeMdl
ExAllocatePool
ExFreePool
NtQuerySystemInformation
hal
KeAcquireInStackQueuedSpinLock
HalMakeBeep
Sections
.text Size: 182KB - Virtual size: 182KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 38KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bea0 Size: 448KB - Virtual size: 447KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bea1 Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ