Analysis

  • max time kernel
    140s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    15-05-2024 14:29

General

  • Target

    d667cf36d619871bb7ab92c5aae14cf0_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    d667cf36d619871bb7ab92c5aae14cf0

  • SHA1

    b86a7a7e6dfacabdc9faa24c0d690b58832f5be1

  • SHA256

    55dd70526765fb339deec7db6bba22866273b43a8d310ea512db933ab4c7bb1e

  • SHA512

    c29834aea2425633533bb66a345ccdaa87112b7f95fcbe51ab17c9b28a766839128d308388ba6e28f507fc41bfc7883a72554ba48ee4d5f45685cf0a1d870cec

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+qK:LJ0TAz6Mte4A+aaZx8EnCGVuq

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d667cf36d619871bb7ab92c5aae14cf0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\d667cf36d619871bb7ab92c5aae14cf0_NeikiAnalytics.exe"
    1⤵
      PID:1340

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-FZhCQvXkDZZidjeK.exe

      Filesize

      83KB

      MD5

      b8ebf47505ad0295e19d5b8446f21c81

      SHA1

      77235da57c334c6b86d0c2b86558e494c1fe8b20

      SHA256

      404354f9f2629dc1013a809ab54bab640897cf15f224b9c0ae9bd62cb073109e

      SHA512

      75a3b4c5eaa259b0236e9e2639d9790e25eaa17afc432115b1ff1d2170d2dfa292d758ed74518ac9411739032d0ac9d6f6b15a518f6d0e91650cdb2a8ae9fc57

    • memory/1340-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1340-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1340-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1340-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1340-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1340-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB