Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    17/05/2024, 06:13

General

  • Target

    bd5ba1ba3feabcb41c8e92c7385e2b60_NeikiAnalytics.exe

  • Size

    2.4MB

  • MD5

    bd5ba1ba3feabcb41c8e92c7385e2b60

  • SHA1

    ee62713cfe68f7cf304b226962da7a29b99b4637

  • SHA256

    a0d40c0585b66cadd594e6ad2709101863daed02ce7b8dafe640a775ae1542a6

  • SHA512

    d07300e80a1db6fce5a3a8d70f9718fa5aaa1a82434709348e92a837d585f32feb351817d5d854aa238ac9f7fbbd9480884a4e3aa15abf5f2eb6d605c513695f

  • SSDEEP

    49152:QEZJxHqXcKIx8ggcgPpQdxr7zKycAMT6sluuuuuuuuuuuuuuuuuuuuuuuuuuuuuD:QE7xHqs/Ojaxr7z/cApauuuuuuuuuuuz

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd5ba1ba3feabcb41c8e92c7385e2b60_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\bd5ba1ba3feabcb41c8e92c7385e2b60_NeikiAnalytics.exe"
    1⤵
    • Checks processor information in registry
    PID:2944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads