Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2024 00:37

General

  • Target

    427ef181839786c198c5e39730d9f610_NeikiAnalytics.exe

  • Size

    72KB

  • MD5

    427ef181839786c198c5e39730d9f610

  • SHA1

    088bb6ef7058e692f5a4171fd0ae40f91fc42ab9

  • SHA256

    84b8bf6e57b1bc62e2bbe1c67d5a162547ee34c27a949ed64023d06d937b6edf

  • SHA512

    7bb7c758799e27524c35cbb6541a3d4f62502a28787f70621052bc38b6637749e8407db50097c7f4b32fb48384770844729edca6b294e03c9f6cac7af0f44caa

  • SSDEEP

    1536:ITphfX3UFUUnCZkQgPzwfR2PvEBW6OeMvXPM6SMb+KR0Nc8QsJq39:O0ZnwgsfRuvEY6OTvEJe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

Processes

  • C:\Users\Admin\AppData\Local\Temp\427ef181839786c198c5e39730d9f610_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\427ef181839786c198c5e39730d9f610_NeikiAnalytics.exe"
    1⤵
      PID:1284

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1284-0-0x0000000000020000-0x0000000000021000-memory.dmp
      Filesize

      4KB