Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
07-06-2024 12:44
Behavioral task
behavioral1
Sample
ad1e8fc4a1032223d8d0acf2bac85a90_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad1e8fc4a1032223d8d0acf2bac85a90_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
ad1e8fc4a1032223d8d0acf2bac85a90_NeikiAnalytics.exe
-
Size
83KB
-
MD5
ad1e8fc4a1032223d8d0acf2bac85a90
-
SHA1
24092e1f7909da547433b3abc14b19da50b0a3a2
-
SHA256
7fc15bf71178a91c9263d6372237fb5f3800f7a7b0657347d23b78ebdbaefcc6
-
SHA512
c4b84cc7c330aee5157a3c9987e4f0b3070beda681ffff72f40fb906d5839e1038248eb72e847d436a7dee65bd77bdbdd65a62b2b4085c4c8f3981be7edc6e21
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+BK:LJ0TAz6Mte4A+aaZx8EnCGVuB
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4220-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4220-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4220-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000600000001e5b4-11.dat upx behavioral2/memory/4220-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4220-21-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4220-28-0x0000000000400000-0x000000000042A000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD584f96fd970914cc5e15144c984a15052
SHA13bf87a357daecedb89c770c3f78b2a78c6024d22
SHA256a66816e059c475f8fdc22c74d60a8d2af68c05df46bc6bf6de7a4328b710cc83
SHA51224b8536c38cc835328fd437c40f3fb65053ec56ae9d11886d04c47279db9f0d993ed9aed7f75f8d8230393a786f171a0bb5d58165964e49c5c3e6a9ca785cb93