Analysis

  • max time kernel
    140s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 04:48

General

  • Target

    3698524265eb6a84b234bee9e00cf59ea08b43af82a13e16be5f37352125185b_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    92b5174b3c205d44255512bce56be000

  • SHA1

    bb02736cbd72207b6fa9df43b109c072d7039bdf

  • SHA256

    3698524265eb6a84b234bee9e00cf59ea08b43af82a13e16be5f37352125185b

  • SHA512

    bc53a56e63ac5848b1eebec9885e8732b6987f985e8eb0f2ed0b32763faba55f14d57846303bb372dc001ec90bd37c37c2fb3b3c7a47254227cc6a4533155737

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+yK:LJ0TAz6Mte4A+aaZx8EnCGVuy

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3698524265eb6a84b234bee9e00cf59ea08b43af82a13e16be5f37352125185b_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3698524265eb6a84b234bee9e00cf59ea08b43af82a13e16be5f37352125185b_NeikiAnalytics.exe"
    1⤵
      PID:1716

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-geeVX69gJodmqelD.exe
      Filesize

      83KB

      MD5

      7b5a7be7c68e041444091a9f32afe0eb

      SHA1

      c455c4c447de2ae25fea8af03c5cd8097618d953

      SHA256

      36a471303dc7d897f837669e9fc44da1c9a3098a1ad1b88bf51869044fd0f9ff

      SHA512

      67a7100a8332f2ab4d09d505b1fb19bdb47d75a199f7ba3788197eb1628afe467cb8219893ebfdb5a12a689b12b29ad437c0dfed6db2d3bc14a9b7a5398467e4

    • memory/1716-0-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/1716-1-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/1716-7-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/1716-14-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/1716-21-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/1716-28-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB