Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 09:38
Behavioral task
behavioral1
Sample
4bec00bdf6a29a510424fd0fa7300670_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4bec00bdf6a29a510424fd0fa7300670_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
4bec00bdf6a29a510424fd0fa7300670_NEIKI.exe
-
Size
83KB
-
MD5
4bec00bdf6a29a510424fd0fa7300670
-
SHA1
46a3fce822d64cba06d3533db6929ad7d2b800fd
-
SHA256
18a4f02326a9dcc663b97e80ec305eff4e6a912c809200161edd59789a04a1d6
-
SHA512
4ae02b64036fff15e1f7ae9903fa76d7657b1c3f03028bf33aabba532f340b4647276a0c272cf89dd1823533eeb758276e6f8f239114f26bdd764158dac14181
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+ZK:LJ0TAz6Mte4A+aaZx8EnCGVuZ
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/516-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/516-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/516-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000f000000023b98-11.dat upx behavioral2/memory/516-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/516-21-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/516-28-0x0000000000400000-0x000000000042A000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5989bbfdf0089a6a98d122147473cb0ac
SHA1d9f3a0e9f0989c6dd64626f1ba4197b434c79746
SHA25668373f977918101f5b3d0ab12f08ba156a5181f909a5c5a4580b05522c8f7eb4
SHA512944d4b8064ad9d4775257e7f891d90df4435adaf541990f218cfd70682a27d909fb70a75915a228ab5361014aaa7873ac894a78fc60edc0c5aa2f3b698dd2926