Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 08:53
Behavioral task
behavioral1
Sample
44e11a52d0bdde04245a7fa51bb551356c48ead97cfcf369d13f83c73dc11900_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
44e11a52d0bdde04245a7fa51bb551356c48ead97cfcf369d13f83c73dc11900_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
44e11a52d0bdde04245a7fa51bb551356c48ead97cfcf369d13f83c73dc11900_NeikiAnalytics.exe
-
Size
126KB
-
MD5
84d61af9fb609eaea5f173bcf4a0c000
-
SHA1
f6bf389cbc60b989d72d05b5dc6989fd97c937a4
-
SHA256
44e11a52d0bdde04245a7fa51bb551356c48ead97cfcf369d13f83c73dc11900
-
SHA512
e1ee09d7207e0d1d9cd4d9cac4e3cb985794132fefab6e3c7a4720458b3156eab6fd2d5fa268aaf742764c92479ccd11991b2d1793c28cd10aa753fbb2a2e78a
-
SSDEEP
1536:YcbqyEk65QiMa2Zi2tSVG4FnjJdLl19/Gb6XBMC4HteMLBK:7LSQilNIHujLl19/Gb6XBMBeMLBK
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2968-0-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/files/0x0007000000016c7c-5.dat upx behavioral1/memory/2968-102-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe 44e11a52d0bdde04245a7fa51bb551356c48ead97cfcf369d13f83c73dc11900_NeikiAnalytics.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD584d61af9fb609eaea5f173bcf4a0c000
SHA1f6bf389cbc60b989d72d05b5dc6989fd97c937a4
SHA25644e11a52d0bdde04245a7fa51bb551356c48ead97cfcf369d13f83c73dc11900
SHA512e1ee09d7207e0d1d9cd4d9cac4e3cb985794132fefab6e3c7a4720458b3156eab6fd2d5fa268aaf742764c92479ccd11991b2d1793c28cd10aa753fbb2a2e78a