Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 21:04

General

  • Target

    07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5_NeikiAnalytics.exe

  • Size

    105KB

  • MD5

    a10ae788f0cb230b6a271a03278692a0

  • SHA1

    f0538ca316da2b1555e438e7d0f041668060e411

  • SHA256

    07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5

  • SHA512

    b42fe9ad8f1c212041c14966d49ee976dcb70b870631fb712463d106c40e2f6aa8c456d200a1b219a4c4f6749469a3bb4a9fa04d6d9a7b760ebd6567fad29c15

  • SSDEEP

    1536:be1+PsRuRfDOyMsqGvq3ogaI/n01l6zUhOq2qDYjVCCizbgECnpE9+eV1gJ:bpURuRfDO+qKq3oga1qQI8WVC9lF9X6

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5_NeikiAnalytics.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1900

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1900-0-0x000000013F690000-0x000000013F6C6000-memory.dmp
    Filesize

    216KB

  • memory/1900-1-0x000000013F690000-0x000000013F6C6000-memory.dmp
    Filesize

    216KB