Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    07-06-2024 13:53

General

  • Target

    5e643b141c55d42c9f3d1e2d8e419790_NeikiAnalytics.exe

  • Size

    14KB

  • MD5

    5e643b141c55d42c9f3d1e2d8e419790

  • SHA1

    bbe48adae80457b6548047617c76ef9974571f4a

  • SHA256

    d504422b74ccb126f54f8b3133aaadea15c25c4942ab9ab8da9b1e26f4b41f48

  • SHA512

    0fa76a83e0c4aa3c6512fcd25efef3267d23fd9e74e88899d43e5d487c04db4f41a1ee4d7de9110c9ee0d0a3859268a74c84153cb910e2264e8e2f1219ef614f

  • SSDEEP

    384:kfAPDOMG61lllllspgp1EZufBYzDE045H:kAPi961lllllspgp6Zuf0A

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e643b141c55d42c9f3d1e2d8e419790_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5e643b141c55d42c9f3d1e2d8e419790_NeikiAnalytics.exe"
    1⤵
      PID:1632

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1632-0-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/1632-1-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/1632-2-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/1632-3-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/1632-4-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/1632-5-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/1632-6-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/1632-7-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/1632-8-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/1632-9-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/1632-10-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/1632-11-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/1632-12-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/1632-13-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/1632-14-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB