Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:52
Behavioral task
behavioral1
Sample
66228c94260c38ef58d466613210a660_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
66228c94260c38ef58d466613210a660_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
66228c94260c38ef58d466613210a660_NeikiAnalytics.exe
-
Size
83KB
-
MD5
66228c94260c38ef58d466613210a660
-
SHA1
90e2f083cc1d04ba5c04924ed01fe650afd7fd96
-
SHA256
f1e6292a7303ae56098ca6be6413c9f9bada2944162dfe1627a1e3eddfe1adf7
-
SHA512
fe31b69ddc56810cca686024edbdb7fcb9d4c30d3df9aae3edfc7944d086a590b53178d4c18b956cce9e7d654abdb0f745a9714d94b522596cc781fa689c4d8c
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+IK:LJ0TAz6Mte4A+aaZx8EnCGVuI
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3676-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3676-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3676-7-0x0000000000400000-0x000000000042A000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\rifaien2-iAR6wX6IN0narUKm.exe upx behavioral2/memory/3676-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3676-21-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3676-28-0x0000000000400000-0x000000000042A000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5522ad3df396a060ad2e4b6d15dde9768
SHA12813e0d3b6042af9de6c658526493f0dcac7ba41
SHA256082552766a92ad195a62eff75e4c4b3dc76877a3a9247a4c36386ceb03a3adfc
SHA512ad3d8e80910cb4512a0d8a1dc67bf5f1ea7463612ac37e405cf995b170346acf25c8c4403732b7808b4d99410861ffc1a4e5b1068ffa7a991d32d357b89a01b7