Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:33
Behavioral task
behavioral1
Sample
41160856b0d3e2269e3e6188a3fa2850_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
41160856b0d3e2269e3e6188a3fa2850_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
41160856b0d3e2269e3e6188a3fa2850_NeikiAnalytics.exe
-
Size
83KB
-
MD5
41160856b0d3e2269e3e6188a3fa2850
-
SHA1
eb92154e49c795a860e7d50d694319587c976856
-
SHA256
e95d7f05724d2493b9d15b0cfc35534510cdb143d973db879f834e7804144840
-
SHA512
b0c70e684a93519410f4d402985e7d5fe07eb6f1128916548ab51fa839ba6768da26603ffaa01527949752744d8db3e5ecdd2df0307de953601cd82117340058
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+uK:LJ0TAz6Mte4A+aaZx8EnCGVuu
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4480-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4480-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4480-7-0x0000000000400000-0x000000000042A000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\rifaien2-UtDUicvKNrYuJVXm.exe upx behavioral2/memory/4480-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4480-21-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4480-28-0x0000000000400000-0x000000000042A000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD59e9a3938fa134c693f1c3c446236b2b9
SHA1121156d9c6637fc81a0cd9640b6d3b552e9942ed
SHA256b7c7da199d59f62eeab91e21412641f5425ac06ad26e5eedd624a0a879aeb255
SHA5129c77c094ec6b8a19967aea513e2ec6e8415090094c0f2c2b2ce3750f9cc4aac5354e6c87899f3dd8a8aa2f78877c2227bd025b5edbaf43ac2a0a2d9cbdbebb96