Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 13:55
Behavioral task
behavioral1
Sample
5a2566f7452e2f485884b82c5b6119421192f9dbd8359fac0bbe7b20a22e6a97_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5a2566f7452e2f485884b82c5b6119421192f9dbd8359fac0bbe7b20a22e6a97_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
5a2566f7452e2f485884b82c5b6119421192f9dbd8359fac0bbe7b20a22e6a97_NeikiAnalytics.exe
-
Size
83KB
-
MD5
5f14bdfff4a588383424c51b94facf50
-
SHA1
803d45853df8d193c0496d8447746ef97619b1e0
-
SHA256
5a2566f7452e2f485884b82c5b6119421192f9dbd8359fac0bbe7b20a22e6a97
-
SHA512
e3019c358eb2acd1a65d1c1e59fc20348af553fecd1a71ee00996d4c2d39477f0a1d44a50fb6dec03a308102b429fa29392dc0c3211412375dae990e72affb78
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+jK:LJ0TAz6Mte4A+aaZx8EnCGVuj
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/5108-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5108-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5108-7-0x0000000000400000-0x000000000042A000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\rifaien2-Ey4VBtlmf70rEKQt.exe upx behavioral2/memory/5108-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5108-21-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5108-28-0x0000000000400000-0x000000000042A000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD50475445b1a349492076407cc5330c9ba
SHA1bbe29bcb1a63adc8ab2767dda4add93cf3bd600a
SHA256b32a07913a0d584192df9f81728b4ecbf15da55afc64493041411e98505eb3c0
SHA5123627ec6986bad0abaa2bf2b98f70dfc15d01993eb3060157663a67f268d7e624d1b0282345791e19d9cb7763ae1284506e53e864df5d53162c0d58d145f2ef97