Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 20:49
Behavioral task
behavioral1
Sample
2d867369cbbb86b9ee5220035f778980_NEIKI.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2d867369cbbb86b9ee5220035f778980_NEIKI.exe
Resource
win10v2004-20240426-en
General
-
Target
2d867369cbbb86b9ee5220035f778980_NEIKI.exe
-
Size
29KB
-
MD5
2d867369cbbb86b9ee5220035f778980
-
SHA1
b3107993e3a375faecf2a548f230c2c5ef49c4a7
-
SHA256
9c9863bd106ec4db675738536f182046b885bbd6ff5a75c9d98d7f5c03098cb7
-
SHA512
7d6f1a75cc508321589470eb03006837d851cf4a87eb76268a9eb018c0d8da4030bbb69830d98e72ad6ab913462618c45560da7fb470ed007a55479d54fa5fef
-
SSDEEP
768:ITRfpN0pOy3OzeXmOGXbJOlB2vsLCik5dAy7b6lSs:IHzzeWHXbJGB2EOik5h36l7
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1576-0-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/files/0x0007000000016c3a-5.dat upx behavioral1/memory/1576-101-0x0000000000400000-0x000000000041A000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD582f9a725bc5fb16aed1ef33b66916558
SHA1e7d239aefcab47bc8d9392ae72554eb4430825d8
SHA25670dcbaa7a3709e7405421caee7e5898a10d1b2053e0540f62373c1d6bfc4c05d
SHA512720a53d62c36494cd6142e16ae84f8fc9a6cae46a1d27db0c86d16cbf84c8d4bdbf012f78c26195de1c4375c134c4c8526880c81a0e9bc6f0a5a1cbc4f79bc86