Analysis
-
max time kernel
51s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-06-2024 23:50
Behavioral task
behavioral1
Sample
13557dec5e6702efca6c1620254f2d052e5d10a2630136eecaf0593f562cb470_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
13557dec5e6702efca6c1620254f2d052e5d10a2630136eecaf0593f562cb470_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
13557dec5e6702efca6c1620254f2d052e5d10a2630136eecaf0593f562cb470_NeikiAnalytics.exe
-
Size
44KB
-
MD5
79dda0f32b538f543ca03d2b275fc030
-
SHA1
1a3a6a62a65c250ed0b97466257bce73ae23dc28
-
SHA256
13557dec5e6702efca6c1620254f2d052e5d10a2630136eecaf0593f562cb470
-
SHA512
8b8a4df4be37f057ba57f6e28c0f05431c234933adc8156bf8c78060ac633b76b951a44c8677c608d4f5501342998f0cec198949dc3365036f6865d09e5c5e2b
-
SSDEEP
768:ITRfpN0pOy3OzeXmOGXbJOlB2vsLCikGF2xdKJCh5PTnEMen6X2L7UAv7Xg:IHzzeWHXbJGB2EOikptEMs6XW7U0g
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1460-0-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/files/0x00070000000233ed-5.dat upx behavioral2/memory/1460-101-0x0000000000400000-0x000000000041A000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD56ac6662984eee2179f09f564e91bf9b3
SHA1d311cc8b787f08e17a83e4398f3b42ecee660dbb
SHA25690ed34c6eba14dcac8f915085898916223ee83b19b9173ad1159df14021b015f
SHA512a24c144cb9c9a85a4e88891ca6e69fa81f3933fbcb9e56e4f7b4230cf32059cb6062a4373eb257a8e1d451a4124f9b90f94b27bf9a4b2a2450a5b10c4dc84b0c