Analysis

  • max time kernel
    141s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2024, 21:28

General

  • Target

    910b4d87097833660278a62c730f0320_NeikiAnalytics.exe

  • Size

    14KB

  • MD5

    910b4d87097833660278a62c730f0320

  • SHA1

    d28e4455c875b8d53be4986f224c2d842a04fbdf

  • SHA256

    b87443e18e5197883ef590a242aafe08b541b14fd69a48a93bfdbaaabdca8e10

  • SHA512

    81a6a9fd2aa97fbbb172c847b408d1dd13c150a98ce9269c1cd2e0723064e62f42f927824074f0051115450d492f390b36ebc631124d80fb3bd20b901cc21872

  • SSDEEP

    384:ulfR/vUPqH9sWf5rDt8BoXDE045Hpiii:opngqH7f5vEMA

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\910b4d87097833660278a62c730f0320_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\910b4d87097833660278a62c730f0320_NeikiAnalytics.exe"
    1⤵
      PID:3464
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4204,i,6166776566165096562,4582328833313060853,262144 --variations-seed-version --mojo-platform-channel-handle=3804 /prefetch:8
      1⤵
        PID:4844

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3464-0-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/3464-1-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/3464-2-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/3464-3-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/3464-4-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/3464-5-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/3464-6-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/3464-7-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/3464-8-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/3464-9-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/3464-10-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/3464-11-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/3464-12-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/3464-13-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/3464-14-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB