Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 19:48

General

  • Target

    2a7a88ad8e3dddc6d0e33c5babd21ee0_NEIKI.exe

  • Size

    68KB

  • MD5

    2a7a88ad8e3dddc6d0e33c5babd21ee0

  • SHA1

    8e108d549cce8d452b03f092f966ca5f28e5b8ba

  • SHA256

    13d6490938a365c892734445ab445c565eccd6e979b478339502bceeee09e319

  • SHA512

    1289e9c3c7b04cdd0ef390d81227f706c3183fe3fbea2e0fa1f3421e1c2ff0d84c9a6a3b76808328124dad94d67dc610754fd8ca193ce34d313cc9bf46a3a915

  • SSDEEP

    768:pRfAUJmQCcmLCXQq6fsKiJYsIkjJVzqspJIUL6rza6UEktLddOJw/:pKUNHFKQbIkHfJp6PidOJ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a7a88ad8e3dddc6d0e33c5babd21ee0_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\2a7a88ad8e3dddc6d0e33c5babd21ee0_NEIKI.exe"
    1⤵
      PID:2068

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2068-0-0x0000000000400000-0x0000000000411000-memory.dmp

            Filesize

            68KB