Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 06:05
Behavioral task
behavioral1
Sample
ef8d3005203957e9974535914bcb6760_NEIKI.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ef8d3005203957e9974535914bcb6760_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
ef8d3005203957e9974535914bcb6760_NEIKI.exe
-
Size
83KB
-
MD5
ef8d3005203957e9974535914bcb6760
-
SHA1
b1af25853bdc78815002593dde198b16c31c86df
-
SHA256
95f4dc36830452c2168be996a90f8978f103462b3a354d1acc34461f256e1351
-
SHA512
e1f9c48e00f7c333c73f03f2793733d4cdf6e14f2a81f51aebbec7ade25c1c3f47e022364745447265639d6213ccdb2bcb42c3900ebeb6959d407262c115addc
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+1K:LJ0TAz6Mte4A+aaZx8EnCGVu1
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3772-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3772-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3772-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0011000000023a58-11.dat upx behavioral2/memory/3772-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3772-21-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3772-28-0x0000000000400000-0x000000000042A000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD50ba3438a912c84b6bee81d5a9d5d770b
SHA15179111fcc31cde845d62d73eda591aa0a2a791c
SHA2562035c44368fcb4fdea4a66d376e08c290180c913c89914b44a705657824b2ac5
SHA512a68366f783b9f2435ea1654667abe6fed3cf30c42cf165cc00852173ea11e0e6f307e81612d8fd5976a643b73a92349a6fe1d02e5715e6b0e3a3cdd35b7cc40c