Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:56
Behavioral task
behavioral1
Sample
728b8d397a4e3bc08a08213774551fa0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
728b8d397a4e3bc08a08213774551fa0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
728b8d397a4e3bc08a08213774551fa0_NeikiAnalytics.exe
-
Size
29KB
-
MD5
728b8d397a4e3bc08a08213774551fa0
-
SHA1
ddfef2a50f10a06a547b32b4f8b7227afc355b9e
-
SHA256
727726d129556e2f4dbc49c41041e1cb71b2982440d848ec85223a6982262505
-
SHA512
bfd051100310c8913ba99439f9bad3b7dec4881952947161edeb7c8bc183321e6e324f0ea83986542d8dbf991a9b48702005c64f29e78c7413ae9ec2bf503fe6
-
SSDEEP
768:ITRfpN0pOy3OzeXmOGXbJOlB2vsLCik5dAy7b6lSs:IHzzeWHXbJGB2EOik5h36ln
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2180-0-0x0000000000400000-0x000000000041A000-memory.dmp upx C:\My Downloads\MSN Password Hacker and Stealer Key Generator.exe upx behavioral1/memory/2180-102-0x0000000000400000-0x000000000041A000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\My Downloads\MSN Password Hacker and Stealer Key Generator.exeFilesize
29KB
MD51355983f53a833ee0a13bf5ae61c23b3
SHA13160da050aba13117b4c22c30b5aae716b0c6190
SHA256497ab317c2e46eb829c7d0036b9bcba9a946e4c59f19fb3b1c1438b301e70e1c
SHA5121fce8c263a30ab5b2fb1efeefc26aa8aa9b9380bac7c8142f31311280eb036f582b591450b14977abcbef2158144786f1a7655f650e21a26a0493ca845f988bd
-
memory/2180-0-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/2180-102-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB