Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 13:50
Behavioral task
behavioral1
Sample
818748e1a6211e0dbe393bd1ba0f0b00_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
818748e1a6211e0dbe393bd1ba0f0b00_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
818748e1a6211e0dbe393bd1ba0f0b00_NeikiAnalytics.exe
-
Size
83KB
-
MD5
818748e1a6211e0dbe393bd1ba0f0b00
-
SHA1
8fdb164471f5d97677844b23e27f6af08d3cc214
-
SHA256
bd90b615d1abf37dea447cbac47dc43769ed1092ea453dbe3cfe4798a15fa4d8
-
SHA512
396cafbc2ee5f3f188e8a38ffcf884825680cd9cc28c5b9401e644a8f865cf399daf70de9a71427c2056f9bb545b0a623d449868c24e3c6597915a1dd43dca44
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+vK:LJ0TAz6Mte4A+aaZx8EnCGVuv
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1460-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1460-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1460-7-0x0000000000400000-0x000000000042A000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\rifaien2-UBge6aVWzdlv1us4.exe upx behavioral1/memory/1460-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1460-21-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1460-28-0x0000000000400000-0x000000000042A000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\rifaien2-UBge6aVWzdlv1us4.exeFilesize
83KB
MD58eb48cc70e52e8f81b3e2196819d83b9
SHA17d21edfcfd4be66edde607eb3d57e1b0ef0f8fb9
SHA256ee5255bccc4f98ef1e422eb423c62f615c70dac8490ed323cf6b9b6231a72d03
SHA512499a53b39a1569b3eb7c6ad6ad52a76c9657dbd5cf728ac7c1af1ac520df275c72c13f87045ca4c5447eb0825dde70ad85c08a462f6f07c0b5efd294b9246383
-
memory/1460-0-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1460-1-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1460-7-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1460-14-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1460-21-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1460-28-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB