Analysis

  • max time kernel
    134s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/05/2024, 17:06

General

  • Target

    16a265ec54db0c1e14e68abd61f2b430_NeikiAnalytics.exe

  • Size

    234KB

  • MD5

    16a265ec54db0c1e14e68abd61f2b430

  • SHA1

    e6d94f8e93fb347eef36304b706dc20c73457fe6

  • SHA256

    424aeea33ae939d664927f1d3ecd2a3225fcf8ddae755139c0d0853b41ddae37

  • SHA512

    36d058a2ece96cf60a1c2e370842f9b4ff5a9351a222116f3a166ae26695178b746377f726878be07a52a4b9d956b5f57bec0e1c314c359f95934c22ad02aaab

  • SSDEEP

    3072:HpvRra8TasUM7fd4vc99/uqLefQZKfOC31VwyY9egNtfNjJvjmZqF7Hb/U9+tm5+:H5BtR7LDewyY9egLRhPPm5r2tZ

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16a265ec54db0c1e14e68abd61f2b430_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\16a265ec54db0c1e14e68abd61f2b430_NeikiAnalytics.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4920

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4920-1-0x00007FFA24830000-0x00007FFA24840000-memory.dmp

          Filesize

          64KB

        • memory/4920-0-0x0000000000470000-0x000000000047A000-memory.dmp

          Filesize

          40KB