Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    12/05/2024, 15:08

General

  • Target

    229c0ba7189edaf3004b9adfa387f2b0_NeikiAnalytics.exe

  • Size

    10KB

  • MD5

    229c0ba7189edaf3004b9adfa387f2b0

  • SHA1

    55a99fa754275aff3d8d18b2294c365592cbabd8

  • SHA256

    c7fc095ade4ac962ed51e0eaacd93d40b16891583ffd9e626d74f159bf1d7f14

  • SHA512

    2b000eea6b39bc736259636a18915b931be00a32d6b080421b50ab3ec82c9ec40456c8d7a88d4471019aff11807261a08df537f4f721153080652159e7ababb2

  • SSDEEP

    192:aJh0P5ywanTajVVY8FB2uFtp0yBn8nzr2QCr2OnAq8ZI:H9anTs2y4An8nzr2Qy2OnAqQI

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\229c0ba7189edaf3004b9adfa387f2b0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\229c0ba7189edaf3004b9adfa387f2b0_NeikiAnalytics.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\\259392581.bat
      2⤵
        PID:2908

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\259392581.bat

      Filesize

      212B

      MD5

      98a32079bf4bfdc78c30880a8a5ec376

      SHA1

      6106d25c65518ad9651a464a2b55d2c88e34d395

      SHA256

      3c20a03f6f47d517111d91e631df549a31739e47a98839c0986031e19f90e143

      SHA512

      0718081ec7e7ce00846e6727ad9ea455fa8b245771a6cc9faec4455516d2ccee73948ddc37ff15322001073d013f1cd07a3623f1eda8330988d88741629e88ee

    • memory/2864-0-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2864-9-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB