Analysis

  • max time kernel
    133s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    03-06-2024 12:54

General

  • Target

    a41f036d40403c89c3b2597f7bcd8300_NeikiAnalytics.exe

  • Size

    197KB

  • MD5

    a41f036d40403c89c3b2597f7bcd8300

  • SHA1

    3e6ae9e995463af5b79bc31f23fac6db4a7de52c

  • SHA256

    c9db2e203e91ed95f64f1b04748df74a6ff56e97f889caa729215785a790a2f6

  • SHA512

    310905d57efb4f90a428fadcaf55b572e35dd3c341e866c49e88d86669098156cd2a37e2dc5f58526a6e94d6545edc6e3f0857ec6393a2cc3c2d8081ab84bf59

  • SSDEEP

    3072:JDbEHHXAwrU/TzKMzBln3RWIDJzPQRefQZKfOC31VwyY9egNtfNjJvjm+qF7Hb/u:xEK//VzB5DJMRDewyY9egLRCPdm5GEJL

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a41f036d40403c89c3b2597f7bcd8300_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a41f036d40403c89c3b2597f7bcd8300_NeikiAnalytics.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1700

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1700-0-0x0000000000460000-0x000000000046A000-memory.dmp

    Filesize

    40KB

  • memory/1700-1-0x000007FEF7000000-0x000007FEF7010000-memory.dmp

    Filesize

    64KB