Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 03:04
Behavioral task
behavioral1
Sample
b309f92b04194ce7470dab9e28fef3d0_NEIKI.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
b309f92b04194ce7470dab9e28fef3d0_NEIKI.exe
Resource
win10v2004-20240426-en
General
-
Target
b309f92b04194ce7470dab9e28fef3d0_NEIKI.exe
-
Size
29KB
-
MD5
b309f92b04194ce7470dab9e28fef3d0
-
SHA1
e96d7520ff4c2d1946cffe178d64c790ef36ab31
-
SHA256
2fe65da4094915d4493c613cf325d14ec850b136df84f4f35223eeb0720af7a5
-
SHA512
56ac124770727f885448d061ad64a445e2798694ae6b8b12192f65a5cebe1eb1966359dfb4d4be7c51d6defdbe84645c1857931957ee7e0e9e5c1962cc1eaa27
-
SSDEEP
768:ITRfpN0pOy3OzeXmOGXbJOlB2vsLCik5dAy7b6lSI:IHzzeWHXbJGB2EOik5h36lr
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2028-0-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/files/0x00090000000134f5-5.dat upx behavioral1/memory/2028-101-0x0000000000400000-0x000000000041A000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD57ba38488d600b4868f1906fefdfffb14
SHA15044fd8f1299d9365111650def4fc29d0104e649
SHA256b039de743f5dd8d63773869ec09530e46189260cc1e839c7419f413aca5faeb8
SHA512977e4829c148713c24dbe221248e4b0fd7f5538b76223a80358e8dd3f0075e5f21e41666071efee5ae51045e6e6a2e20391561ad3bff9c975723653f804b6068