Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 00:39
Behavioral task
behavioral1
Sample
655fb51be33a67b070832d22969b8a70_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
655fb51be33a67b070832d22969b8a70_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
655fb51be33a67b070832d22969b8a70_NeikiAnalytics.exe
-
Size
29KB
-
MD5
655fb51be33a67b070832d22969b8a70
-
SHA1
00adaa493b2beb9def19f1742c15071ec80d5484
-
SHA256
aabedb86204af8947788173a839ca5490e4bd551aa07882131cac2a26c102750
-
SHA512
c46dffab1b8e99ab5517173eaee83176ff214a9e3aa6279f210b0c1c12241994e20b6604875a584c45097d278632d38706d58e506694faebf5729f3a7242ad1c
-
SSDEEP
768:ITRfpN0pOy3OzeXmOGXbJOlB2vsLCik5dAy7b6lSi:IHzzeWHXbJGB2EOik5h36l7
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2944-0-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/files/0x000c000000023372-5.dat upx behavioral2/memory/2944-101-0x0000000000400000-0x000000000041A000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5bcd4e9c7ffc0a38c6de16b0907a7b6e7
SHA1a58b7ed0fb7236891350cc97f3be646e16897d19
SHA25678def7d6f64a4928afd22000c4024ca5cf63a5557a5cb0071c31d316e972e90a
SHA5122d471ef36a42a3c0dd8a8e12d00c4130286a1eb57a564789e18157e517043d16b368a1b883fbf841c953d12e5a31f9f42b47c317ed945f53e63388b472d88fe4