Analysis

  • max time kernel
    154s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/05/2024, 01:18

General

  • Target

    48f4f67286269fab5370928256ecfbe0_NeikiAnalytics.exe

  • Size

    14KB

  • MD5

    48f4f67286269fab5370928256ecfbe0

  • SHA1

    3005014f6721940909bfc82f5d6542452230b423

  • SHA256

    75e36f99801e832276a7cb9fa85cd184c14813205f3f87d613afce07e5e39a79

  • SHA512

    ecd7a081c915ef3a0b39eb530605792c3ab634adf43b814fa55ea5b3b28258a3269522e150682200ea73fbc51367b50eedac2b7d3ba4756e6facc729f90f80b6

  • SSDEEP

    384:Pejca53X7IuFqqqqqXBc1MeHvCwDE045H:PevX75qqqqqRceeHvCKA

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\48f4f67286269fab5370928256ecfbe0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\48f4f67286269fab5370928256ecfbe0_NeikiAnalytics.exe"
    1⤵
      PID:2388
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4136 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:4892

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2388-0-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2388-1-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2388-2-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2388-3-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2388-4-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2388-5-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2388-6-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2388-7-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2388-8-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2388-9-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2388-10-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2388-11-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2388-12-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2388-13-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB