Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 12:18
Static task
static1
Behavioral task
behavioral1
Sample
710441c48417520a7ec6565f01d73f4272533816cbc268a5d97d5e3132b150f8_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
710441c48417520a7ec6565f01d73f4272533816cbc268a5d97d5e3132b150f8_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
710441c48417520a7ec6565f01d73f4272533816cbc268a5d97d5e3132b150f8_NeikiAnalytics.exe
-
Size
1.6MB
-
MD5
b971cc8354404b00e37f4c2eef40dde0
-
SHA1
e511c6460e42c7342f61855346e5c26e77e36276
-
SHA256
710441c48417520a7ec6565f01d73f4272533816cbc268a5d97d5e3132b150f8
-
SHA512
a5a9466805ed686b3853d22824c92d03d6b4ac01bef745686cf44d7196d204ed12fcc633ca14f197f006a9f68c131a02ec30c8524e804af8298d37f00b26e041
-
SSDEEP
49152:ey8tuqqGRSW9cdPfbvg3TeuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuTuuuuuuup:ey8tuqtx6dHbvgSuuuuuuuuuuuuuuuuJ
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 710441c48417520a7ec6565f01d73f4272533816cbc268a5d97d5e3132b150f8_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 710441c48417520a7ec6565f01d73f4272533816cbc268a5d97d5e3132b150f8_NeikiAnalytics.exe