Analysis

  • max time kernel
    140s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-05-2024 06:05

General

  • Target

    ef8d3005203957e9974535914bcb6760_NEIKI.exe

  • Size

    83KB

  • MD5

    ef8d3005203957e9974535914bcb6760

  • SHA1

    b1af25853bdc78815002593dde198b16c31c86df

  • SHA256

    95f4dc36830452c2168be996a90f8978f103462b3a354d1acc34461f256e1351

  • SHA512

    e1f9c48e00f7c333c73f03f2793733d4cdf6e14f2a81f51aebbec7ade25c1c3f47e022364745447265639d6213ccdb2bcb42c3900ebeb6959d407262c115addc

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+1K:LJ0TAz6Mte4A+aaZx8EnCGVu1

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef8d3005203957e9974535914bcb6760_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\ef8d3005203957e9974535914bcb6760_NEIKI.exe"
    1⤵
      PID:3772

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-TRMR115uyUAF9wSc.exe

      Filesize

      83KB

      MD5

      0ba3438a912c84b6bee81d5a9d5d770b

      SHA1

      5179111fcc31cde845d62d73eda591aa0a2a791c

      SHA256

      2035c44368fcb4fdea4a66d376e08c290180c913c89914b44a705657824b2ac5

      SHA512

      a68366f783b9f2435ea1654667abe6fed3cf30c42cf165cc00852173ea11e0e6f307e81612d8fd5976a643b73a92349a6fe1d02e5715e6b0e3a3cdd35b7cc40c

    • memory/3772-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3772-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3772-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3772-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3772-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3772-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB