Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 20:44
Behavioral task
behavioral1
Sample
2f611fd997cceb1bdb2a998808624ff0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2f611fd997cceb1bdb2a998808624ff0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
2f611fd997cceb1bdb2a998808624ff0_NeikiAnalytics.exe
-
Size
96KB
-
MD5
2f611fd997cceb1bdb2a998808624ff0
-
SHA1
dc3fd99e4577b3d268211e2c17fc50028e2dc8b2
-
SHA256
828b3e23be76c7dd491d3c1917d6dfafc9964fc3de518bdbce96cf8a3c40154d
-
SHA512
9fe9933abedc882d3a16658f0083a73a5dabbcda8117c21c4bdfdfd3b1205923334f10a7897a2de889b3231520eb28626ea25614570cef952d1a66e607a11095
-
SSDEEP
1536:IRKGJs9ZA19qFy6K/NdgjQknPnQuEvMb+KR0Nc8QsJq3g:rGA+eecjVnhEve0Nc8QsCg
Malware Config
Extracted
metasploit
windows/reverse_tcp
127.0.0.1:123
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2412-0-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/2412-4-0x0000000040960000-0x0000000040971000-memory.dmpFilesize
68KB
-
memory/2412-3-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/2412-1-0x0000000040960000-0x0000000040971000-memory.dmpFilesize
68KB