Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 12:03
Behavioral task
behavioral1
Sample
ddbabe04c42d6bb82375a3e4c382d6e0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ddbabe04c42d6bb82375a3e4c382d6e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
ddbabe04c42d6bb82375a3e4c382d6e0_NeikiAnalytics.exe
-
Size
72KB
-
MD5
ddbabe04c42d6bb82375a3e4c382d6e0
-
SHA1
928f425c52057ffcd8d3370aed9765ae9651782a
-
SHA256
28dd5cb3b693dfd16877f0a564b4e6e4a804966fb6a135ec6b7dd933267651e0
-
SHA512
ebe0e99c7ee1aafd772f527face2612d21bea9e50c32ab78b8a3cbb5ecb9eb324e0ae7d8df392071596c2f1387616b0f655748239ea7c9be652e3b4cb243257a
-
SSDEEP
1536:InMyPENz4P7O2VR3JkDVoGiaB+cu8kA5Mb+KR0Nc8QsJq39:BXNz4Pi2VaVo6+o5e0Nc8QsC9
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1208-0-0x0000000000020000-0x0000000000021000-memory.dmpFilesize
4KB