Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/05/2024, 11:51

General

  • Target

    b181584e82c783172763f90dd1bf5520_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    b181584e82c783172763f90dd1bf5520

  • SHA1

    5300fad58536389e871c461be903c27fcc52d419

  • SHA256

    426d06e17d72f25ddeb044e10502a7d76be64f2c89eb1e296ec6d4caf6ef6137

  • SHA512

    b408f7fe239294c66610bf3c7b03a4f19ce1fe780893aa7d16b2a2b3ece488d56b0b4e0d9d89233d6c87c60952ab119be02ba620d33d0f2f4977d943c0e6a1a6

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+suK:LJ0TAz6Mte4A+aaZx8EnCGVun

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b181584e82c783172763f90dd1bf5520_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\b181584e82c783172763f90dd1bf5520_NeikiAnalytics.exe"
    1⤵
      PID:3868

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\rifaien2-wP6IDg67mBROH2jO.exe

            Filesize

            83KB

            MD5

            e3f2a600ae5460c293f5fc2f3600755c

            SHA1

            0669e1d765ab6f9aa6e3caf022eca81502382a33

            SHA256

            0107a5c5dd2431063c8170fd055bc3d32622ab1c8fdb2ca63083e42848c3cd08

            SHA512

            80716b65dba1123fa41f1a236f402c995b1f1d7b72c37124968aae1c63e4212b629b8f48984ec7d9292ade2bb49a7a57efdc498ba92db4ee771285c165b17b9d

          • memory/3868-0-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/3868-1-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/3868-7-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/3868-14-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/3868-21-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/3868-28-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB