Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2024 22:25

General

  • Target

    2a503254aef438c291d65711be8a1b70_NeikiAnalytics.exe

  • Size

    72KB

  • MD5

    2a503254aef438c291d65711be8a1b70

  • SHA1

    5520187e32dd5ea5beeb60d3bc88b8b4043fe88c

  • SHA256

    20ead5d78b9a987cac82bfaecd0e26f9509e1bd114fbf66d6921ced596c0277d

  • SHA512

    f422898aee4b99629665e3384ccdfa7733017acfee23d7b1822cd9b07c1b94a05d880bd3325be8fe8c73f30d84e0bb4b038cad00f44c280011e63559114d6c41

  • SSDEEP

    1536:IU4vMfVoqSC1+d0HNJZ9ENFQemsNW1fMb+KR0Nc8QsJq39:RXSC1U06QO+e0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a503254aef438c291d65711be8a1b70_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2a503254aef438c291d65711be8a1b70_NeikiAnalytics.exe"
    1⤵
      PID:1124

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1124-0-0x0000000000520000-0x0000000000521000-memory.dmp
      Filesize

      4KB