Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:56
Behavioral task
behavioral1
Sample
5cf7c590c30c63364d2cf98b6ce4c420_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5cf7c590c30c63364d2cf98b6ce4c420_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
5cf7c590c30c63364d2cf98b6ce4c420_NeikiAnalytics.exe
-
Size
83KB
-
MD5
5cf7c590c30c63364d2cf98b6ce4c420
-
SHA1
11fb162e00dc5b4120bef4c7cbb862d2f05c8afa
-
SHA256
9babdbbb3b4748787c11e2407777c1ffab8da127cc7f9dd377ecc802ea136dec
-
SHA512
10e526612361899a57ef9e3cad67a12ccad0624530bea6a7be81eebefc353ef711f2a281ad3835e46e6c33c67b3981a9c8eeb84630cb91c859e3eb967f5a69e2
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+CK:LJ0TAz6Mte4A+aaZx8EnCGVuC
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3228-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3228-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3228-7-0x0000000000400000-0x000000000042A000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\rifaien2-zxMcfqzbFNIjzezn.exe upx behavioral2/memory/3228-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3228-21-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3228-28-0x0000000000400000-0x000000000042A000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\rifaien2-zxMcfqzbFNIjzezn.exeFilesize
83KB
MD567023111e6a6deece0e4b49381012650
SHA1a62dea8f6ca6d8292777199c926daa7a7ec3b890
SHA2566c93c7ee628b48c700d1324fadbbbc2551a6223ed4fbe06087bf0dde95817a1c
SHA51236034ba3ffa6d4aa55f69b6f0739d7e5874c979ef5a4263d50e7c49f896bfada9f2de05859a1a61df257cf9e6879360132ad7d45387b54c1f98cf9db72807600
-
memory/3228-0-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/3228-1-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/3228-7-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/3228-14-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/3228-21-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/3228-28-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB