Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/05/2024, 23:59

General

  • Target

    48e9d456e2537f1073f020f46131b730_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    48e9d456e2537f1073f020f46131b730

  • SHA1

    e6c2a6c1901aa323f3cfcec8c480b00280d23599

  • SHA256

    6dce3728d148a76db9463f204eb39b1b63e21576ac6c8e785b2a0cffbc969700

  • SHA512

    7a5086897645223e8cc1c5a81bae1bffb5600af75068ecbdb6bb6e568f14846082c918eec06c4c6ed5069055c28f0907174d770a9cda5d3fc7b2b731111beeed

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+hK:LJ0TAz6Mte4A+aaZx8EnCGVuh

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\48e9d456e2537f1073f020f46131b730_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\48e9d456e2537f1073f020f46131b730_NeikiAnalytics.exe"
    1⤵
      PID:3572

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-TG7EKBxdwpF7AfnD.exe

      Filesize

      83KB

      MD5

      fec5181f54de0de9fbe9977c72686616

      SHA1

      9774aca67e9df5b5f637de07cd8cef34d6f3c51e

      SHA256

      b2366dee7a670de3d5fab745d09d3716f1a0741fc4aaa850e2567119992c5a7e

      SHA512

      bd579199a41a4edb9a183f8780e9c230cbbc28d78dd097f14b2b64e6b38f7c93f170fdb1db9f29814514e654ae0f9a3aab76de3c42b5574b7d7a8bfc8baa4716

    • memory/3572-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3572-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3572-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3572-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3572-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3572-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB