Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/05/2024, 09:56

General

  • Target

    b04f3053b2553c7abac9716ebe8fdbd0_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    b04f3053b2553c7abac9716ebe8fdbd0

  • SHA1

    2efe9c1b5314a4acbfac044f003daf00f7d153f6

  • SHA256

    eb3b674a607812d4495620a191a8b8e0be650164acae3b48f0746ead38f22bce

  • SHA512

    9d2d181e3ed1f1eef096e552077027c73153fecbcb6ee6395c8dc542a8a4a47dff2f0c20b6668b21013350017b0ab09819fbbd777c468e915131e57d4c47c52c

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+zK:LJ0TAz6Mte4A+aaZx8EnCGVuz

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b04f3053b2553c7abac9716ebe8fdbd0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\b04f3053b2553c7abac9716ebe8fdbd0_NeikiAnalytics.exe"
    1⤵
      PID:1468

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-7LYzrEeO7QYvJDui.exe

      Filesize

      83KB

      MD5

      54a2c5d0e569e47330ed4ffc5f881a7f

      SHA1

      8348748b489b6af6da3be0dc46d53604619aa762

      SHA256

      c0afe742d9805abb4a3185804d01ca9d4fa8f23def63deb48b33703470e7eb8c

      SHA512

      e34bc6fe78a1e7044090405290645f6e3606f24322a9673a034f5e27f80669597ba1bc2b53d0d7664a211b3a706aec282e552a3f1e0c7aab8d08c6b9ba4b3249

    • memory/1468-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1468-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1468-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1468-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1468-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1468-29-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB