Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 05:10

General

  • Target

    37d3cd361c9397cba3683b15d9e9cfd86ffbcc98163e27a284c5378a30d8153c_NeikiAnalytics.exe

  • Size

    200KB

  • MD5

    1ba410a4d501e51c47f5800c8972a490

  • SHA1

    ce38962b8467d7a26bae03256e1cda19aac6aacd

  • SHA256

    37d3cd361c9397cba3683b15d9e9cfd86ffbcc98163e27a284c5378a30d8153c

  • SHA512

    9518e1ca24d8ba036a4ff7f1ebc64a1335736d6fef1f6e263e09d67d60f04307a7a77e2f99f32324fcae6de9cda98363f362d716b63945ca9fb86b4c084492b7

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxtjm8sg7Zf/FAxTWY1++PJHJXA/OsIH:fnyiQSoojmHgnyiQSoojmHhHV

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37d3cd361c9397cba3683b15d9e9cfd86ffbcc98163e27a284c5378a30d8153c_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\37d3cd361c9397cba3683b15d9e9cfd86ffbcc98163e27a284c5378a30d8153c_NeikiAnalytics.exe"
    1⤵
    • Drops file in System32 directory
    PID:1708
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
        PID:1688

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1708-0-0x0000000000400000-0x000000000040B000-memory.dmp
      Filesize

      44KB

    • memory/1708-6-0x0000000000400000-0x000000000040B000-memory.dmp
      Filesize

      44KB