Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24-06-2024 17:13
Behavioral task
behavioral1
Sample
94243d49a4a4f559ddc8e676ef6fff177933300668136b16f73118ba5d2c8d9d_NeikiAnalytics.exe
Resource
win7-20240220-en
9 signatures
150 seconds
General
-
Target
94243d49a4a4f559ddc8e676ef6fff177933300668136b16f73118ba5d2c8d9d_NeikiAnalytics.exe
-
Size
6.0MB
-
MD5
c09124f93cdd88407f3be0736bc09430
-
SHA1
72f751e0b19b8c045cc42ad3b70014cfcc169aae
-
SHA256
94243d49a4a4f559ddc8e676ef6fff177933300668136b16f73118ba5d2c8d9d
-
SHA512
181d2be4e4419eea17a1f98e6cdde90b19694c95cc07ac8f4bfff8f26ad4e8e384bccd3a16ac6b883e3ac304504ad03b8b8f9d66c1e2f9e422f7d27e6398d6a2
-
SSDEEP
98304:EniLf9FdfE0pZB156utgpPFotBER/mQ32lU+:eOl56utgpPF8u/7+
Malware Config
Signatures
-
XMRig Miner payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4924-0-0x00007FF7AC8D0000-0x00007FF7ACC24000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral2/memory/4924-0-0x00007FF7AC8D0000-0x00007FF7ACC24000-memory.dmp upx
Processes
-
C:\Users\Admin\AppData\Local\Temp\94243d49a4a4f559ddc8e676ef6fff177933300668136b16f73118ba5d2c8d9d_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\94243d49a4a4f559ddc8e676ef6fff177933300668136b16f73118ba5d2c8d9d_NeikiAnalytics.exe"1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4080 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4924-0-0x00007FF7AC8D0000-0x00007FF7ACC24000-memory.dmpFilesize
3.3MB