Analysis

  • max time kernel
    134s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/05/2024, 21:29

General

  • Target

    03c0cb62f3c54b65529209d946b28c70_NeikiAnalytics.exe

  • Size

    2.0MB

  • MD5

    03c0cb62f3c54b65529209d946b28c70

  • SHA1

    2866c8dd8b593a7472ad9adaf5cd044eb91056a9

  • SHA256

    08bf211b36844187b82e0079242ea7b0239ecfefef94b5d27472683cec825520

  • SHA512

    5276e7a26c89a185c8f369665db66a83e5a1563f5bef304c42f5c250c81594ce35cacd0564ae965e22f6cbdafdb6ee565bb0f5b1fb896692b85062513dc2aab6

  • SSDEEP

    49152:78+Sd2zml74BKzY7slWbIOocUSP2bn7UBc0kIs:Y1ymlUBKzMLbbkXcBDkZ

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\03c0cb62f3c54b65529209d946b28c70_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\03c0cb62f3c54b65529209d946b28c70_NeikiAnalytics.exe"
    1⤵
    • Checks BIOS information in registry
    PID:884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/884-0-0x0000000140000000-0x00000001404D8000-memory.dmp

    Filesize

    4.8MB

  • memory/884-1-0x00007FF965530000-0x00007FF965532000-memory.dmp

    Filesize

    8KB

  • memory/884-2-0x0000000140000000-0x00000001404D8000-memory.dmp

    Filesize

    4.8MB