Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 15:33
Behavioral task
behavioral1
Sample
7fff7fd54fae79703fd58300f9fb6260_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7fff7fd54fae79703fd58300f9fb6260_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
7fff7fd54fae79703fd58300f9fb6260_NeikiAnalytics.exe
-
Size
29KB
-
MD5
7fff7fd54fae79703fd58300f9fb6260
-
SHA1
71fa595a64072678c5efc53a04a332d1ee2240ef
-
SHA256
fd358d88877567cc0a6c6076021626b5a8d66781100949f66592238a4f33ec7f
-
SHA512
dfec0b5041de96392c9629c5dc3ef7f0213c32cc4ea7e41c4940a4dd7da5067ac2a72e12f3d42e1772cce4020459df5abad3265938971dafc92bdc6d9379fd55
-
SSDEEP
768:ITRfpN0pOy3OzeXmOGXbJOlB2vsLCik5dAy7b6lSI:IHzzeWHXbJGB2EOik5h36lT
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4800-0-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/files/0x000f000000023377-5.dat upx behavioral2/memory/4800-101-0x0000000000400000-0x000000000041A000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5678cb44860a5ff4454bfe643d5e7ad0f
SHA176318a9f5cfc9216070538dad8b23a74512257ee
SHA256af2d90e240bdaacb4fbb098512489b6bb435a0f10cc2eb96ad36a813efdf45d4
SHA5122e981c29d090f8caa2b57d0427274fb080b9f87c044a51f646af8e9f27ff9f9ec7a1606957f66a8e7e5c83e0c2281633c82bc550534ac4227275d9d414c3afbe