Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:56
Behavioral task
behavioral1
Sample
5cf7c590c30c63364d2cf98b6ce4c420_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5cf7c590c30c63364d2cf98b6ce4c420_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
5cf7c590c30c63364d2cf98b6ce4c420_NeikiAnalytics.exe
-
Size
83KB
-
MD5
5cf7c590c30c63364d2cf98b6ce4c420
-
SHA1
11fb162e00dc5b4120bef4c7cbb862d2f05c8afa
-
SHA256
9babdbbb3b4748787c11e2407777c1ffab8da127cc7f9dd377ecc802ea136dec
-
SHA512
10e526612361899a57ef9e3cad67a12ccad0624530bea6a7be81eebefc353ef711f2a281ad3835e46e6c33c67b3981a9c8eeb84630cb91c859e3eb967f5a69e2
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+CK:LJ0TAz6Mte4A+aaZx8EnCGVuC
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1308-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1308-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1308-5-0x0000000000400000-0x000000000042A000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\rifaien2-m4APePa0tI0cniJT.exe upx behavioral1/memory/1308-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1308-19-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1308-26-0x0000000000400000-0x000000000042A000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\rifaien2-m4APePa0tI0cniJT.exeFilesize
83KB
MD55c777faf168628a031ba7726bc9d86b4
SHA11070ac724f207b2d52258d2bec446f46ac7d3478
SHA2569b63cee9f94169b29f250efca7c4bb544e179551442b991444a0fc8c3fd7c9cf
SHA512d85b8a1b3132c182c66fa9a5a63bdaddce4918a4871e5a796e2eba3912e5cf4d0f0ff9d440f8c28aee338d267e518b87b6145cea776a25645d8cd6519822edc8
-
memory/1308-0-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1308-1-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1308-5-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1308-13-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1308-19-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1308-26-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB