Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 04:02
Behavioral task
behavioral1
Sample
a2496010abd6903b4c237c211b6b7e50_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2496010abd6903b4c237c211b6b7e50_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
a2496010abd6903b4c237c211b6b7e50_NeikiAnalytics.exe
-
Size
83KB
-
MD5
a2496010abd6903b4c237c211b6b7e50
-
SHA1
8aff9f961f79f4dcf9d096948a4a6f3a180f3652
-
SHA256
3b0e36fd0214cf926918ad82fec97868ca187e9d58d54f69bec9c128526c1c7f
-
SHA512
4c094de4306defd35580195eccad11705e147cfb59ff1461141de3ed115b879d3ea111d548cfb18b91fe87a7e341f95e6ebeea5e94918c1fe4c81886a09ef636
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+AK:LJ0TAz6Mte4A+aaZx8EnCGVuA
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4472-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4472-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4472-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4472-8-0x0000000000400000-0x000000000042A000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\rifaien2-gvhNjeWVDRuau6eu.exe upx behavioral2/memory/4472-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4472-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4472-22-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4472-28-0x0000000000400000-0x000000000042A000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\rifaien2-gvhNjeWVDRuau6eu.exeFilesize
83KB
MD5334e3fc7fef858003754a0716e5dc61c
SHA1b6325d975db4f05836ce4db35b7e6ea6ba60742e
SHA2560f67820bd98a57ac0b53228f6e89c57c01aef92337d8ab4f71b7bbf9d12a5ee7
SHA512a4de513a187120c632e930314f85e12570fddbc1b7c72051a3a461d13f8292372424da834ebb7312768e868c2649cb9416854b9939f6efb1e49ed6fc953eee3a
-
memory/4472-0-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/4472-1-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/4472-4-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/4472-8-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/4472-15-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/4472-18-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/4472-22-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/4472-28-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB