Analysis

  • max time kernel
    93s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2024 01:07

General

  • Target

    1265a345089455350e2ba8b8a6d2ecf0_NeikiAnalytics.exe

  • Size

    30KB

  • MD5

    1265a345089455350e2ba8b8a6d2ecf0

  • SHA1

    946bb8d86d3bf9e4c8de848ca05d611774b55d09

  • SHA256

    48f99731cc27a8953bf1852ee7ca96a601746d2ba2d738ca809a55a638a4e473

  • SHA512

    7a5c066b1ed8428225031578ce5d99ea11b6b1480118b68480ea5c05285e74c62055e018f0f5bc054e904a200b4888f77d803412c550dc48d7b8d6798c26d761

  • SSDEEP

    768:xEFgcqoHFKr4tYfECB8IyC/5EaSF3bngT7CGheZm:xId5HFKrmYf1ACBEaS4VheZm

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\1265a345089455350e2ba8b8a6d2ecf0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1265a345089455350e2ba8b8a6d2ecf0_NeikiAnalytics.exe"
    1⤵
      PID:212

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/212-0-0x0000000000400000-0x0000000000409000-memory.dmp
      Filesize

      36KB