Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-05-2024 01:13

General

  • Target

    6daeaa230181f187f7002bdcc7403f00_NeikiAnalytics.exe

  • Size

    8KB

  • MD5

    6daeaa230181f187f7002bdcc7403f00

  • SHA1

    d951594326327c2f31d5c141c712c8cb91cd5c45

  • SHA256

    815812d72695e94d9a7a4113f36cf94e757dfeb3108f52a9697817af2ae3961e

  • SHA512

    8ca18ac9af08c59facaaf2c144794ef681ab1f32a2e2113ae05d226164db81ed7fed897f8a2788ebb9a0a26eb53bf6bffe520e1fe9376e4b26a0762fbb759e2f

  • SSDEEP

    192:OKCA1DvrRM8TtcfvlGEyncjWOYgb32gmDQdpkwbPq:BP1L1M8TtcfsnQboQowbi

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6daeaa230181f187f7002bdcc7403f00_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6daeaa230181f187f7002bdcc7403f00_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2384

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\Network\Connections\Pbk\rasphone.pbk

    Filesize

    1KB

    MD5

    fd173c43385971a7435c4bf6e48c60bb

    SHA1

    cfbbcaef7889b29046f0ae21123de2eca2a214e2

    SHA256

    f33ee56a9859d58daf60013125480f3c11086d6abd68f51c3907c1422a2685e9

    SHA512

    43ce49e550af94d048bf5ac1ba4775d841e6fc1aff73e30a88119edeb0ceab2aed6ff88ed7fe97456a96de402cbca1f1a776e25bdcd39d9397d01ea525202668