Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:21
Behavioral task
behavioral1
Sample
6c1bcda850f1218668a2f5378ad98d80_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6c1bcda850f1218668a2f5378ad98d80_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
6c1bcda850f1218668a2f5378ad98d80_NeikiAnalytics.exe
-
Size
44KB
-
MD5
6c1bcda850f1218668a2f5378ad98d80
-
SHA1
28ec78824dbb27f53d9ce661f6f372cb8d4743e5
-
SHA256
0190d98df892db3862525a925da4928ccfd0004838ccdf82d4ab925c8b5d6e3d
-
SHA512
a3023db9010cfe44bad9fdc8e28dde5b1e5d6f8b06a6059c2c69a66869cfbb4f54cd5efdeb1a36f35b0ea99d74863261ce79bb3d24f1d594380a0e702ab951cd
-
SSDEEP
768:ITRfpN0pOy3OzeXmOGXbJOlB2vsLCikGF2xdKJCh5PTnEMen6X2L7UAv7XE:IHzzeWHXbJGB2EOikptEMs6XW7U0E
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2044-0-0x0000000000400000-0x000000000041A000-memory.dmp upx C:\My Downloads\Microsoft Office XP (English) Crack.exe upx behavioral1/memory/2044-102-0x0000000000400000-0x000000000041A000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5af807018fb79c4d80a4b9575361b5d23
SHA17cbdbf53e238a3fb954e347e61f1f6403c5a6b8e
SHA25639d07b49a861c86861aa891dfb973b8740d6f044676d4525b589a62586fe0ca7
SHA512e3000fe515284b1b928ca703a2711de56669bcae69a43a3b2af6d43e48d27b7792f4016d760a7a22cd871ea522d035d1bf402e1b6556e42dc9425c6984b265b5