Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:18
Static task
static1
Behavioral task
behavioral1
Sample
04b8a0ba76fbba0acbd79a9264b360c0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
04b8a0ba76fbba0acbd79a9264b360c0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
04b8a0ba76fbba0acbd79a9264b360c0_NeikiAnalytics.exe
-
Size
1.6MB
-
MD5
04b8a0ba76fbba0acbd79a9264b360c0
-
SHA1
0bd9c7ed70b7915463b4fd396117a533a28e96c8
-
SHA256
94dbd942419c2fe9609995786738151d8b888355e291a5055c7e8dd12f3ddeb8
-
SHA512
51af1c3ace11425a11bd632d539a9caf6a85d4715602253f282db765174290d8895837353c4e0f13b18c7d6d81b07e2583fadcb22d6443e3f6b543b73a9dc731
-
SSDEEP
49152:Wjk4pzfKOeZLDgP+WrvA/umk79iKX/8zi:WwwTKOckp/8zi
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\apmEEF.tmp acprotect -
Loads dropped DLL 1 IoCs
Processes:
04b8a0ba76fbba0acbd79a9264b360c0_NeikiAnalytics.exepid process 2348 04b8a0ba76fbba0acbd79a9264b360c0_NeikiAnalytics.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\apmEEF.tmp upx behavioral1/memory/2348-4-0x0000000010000000-0x000000001007E000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146KB
MD53d4839228c7ee77e28832879eeb17340
SHA1ebe4a6388c8c6831837e232b48b8f4266b7f711e
SHA2565d6ff8a11cda6d5b1e6d8a5562594379a082cee18f402a8a0a26b8cabe428954
SHA512f3c534524eaa4b51ee44a6c1d05a142c0d10d9c1c48db79b60903dd948d5712b367479b82cd85fa8ee094dcd2569c0fd85a36c10c97deab59e49e1f1f4da6c56