d:\程序\kill\Driver\i386\KILLPRC.pdb
Static task
static1
General
-
Target
23f5f783ef109a5166d3ae22a15da7823f3eb9bfd5556b8f8a07272b55de4346_NeikiAnalytics.exe
-
Size
3KB
-
MD5
3ad518d386fee5aef20b02fe877b6330
-
SHA1
1a5259cc37a047ceaaac6be68e4d8f88c48f6318
-
SHA256
23f5f783ef109a5166d3ae22a15da7823f3eb9bfd5556b8f8a07272b55de4346
-
SHA512
3909e450dd075b7ee068239ff644b296f3827c18ef36073311b96890013769648e2e151d39556d27d00f4804af7165c2a3e4b638530cca347b56bfe5885531c5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 23f5f783ef109a5166d3ae22a15da7823f3eb9bfd5556b8f8a07272b55de4346_NeikiAnalytics.exe
Files
-
23f5f783ef109a5166d3ae22a15da7823f3eb9bfd5556b8f8a07272b55de4346_NeikiAnalytics.exe.sys windows:6 windows x86 arch:x86
e833bd1df48442a94c2758b0ea9fd9ea
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
ObfDereferenceObject
ObOpenObjectByPointer
MmGetSystemRoutineAddress
RtlInitUnicodeString
PsLookupProcessByProcessId
ZwClose
ZwTerminateJobObject
ZwAssignProcessToJobObject
ZwCreateJobObject
IofCompleteRequest
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
Sections
.text Size: 128B - Virtual size: 48B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 155B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 640B - Virtual size: 542B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 768B - Virtual size: 680B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 84B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ