Analysis

  • max time kernel
    140s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 08:27

General

  • Target

    21e402872458488df63a4b9e5365288c4c9c11fb873c92c5058cfd35c24917f7_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    cb87c03e6e77fcf4f512f2f2b33511f0

  • SHA1

    37970bf0d77e1ed80b3bed241de33a012bd473c5

  • SHA256

    21e402872458488df63a4b9e5365288c4c9c11fb873c92c5058cfd35c24917f7

  • SHA512

    f3e4399668eab22ff42b4f29a5468c3931baf7ae223d28c86678f861b662d5b506eb94434a0c935a696929bc1e49870d21ca0ac2079cd3a1e50eac5680427d42

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+xK:LJ0TAz6Mte4A+aaZx8EnCGVux

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\21e402872458488df63a4b9e5365288c4c9c11fb873c92c5058cfd35c24917f7_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\21e402872458488df63a4b9e5365288c4c9c11fb873c92c5058cfd35c24917f7_NeikiAnalytics.exe"
    1⤵
      PID:1948

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-CBGv4s1lE8M31JDy.exe

      Filesize

      83KB

      MD5

      ea2f0e1bb3aa1e49ca6dacb1449f2c4c

      SHA1

      7b9e624ef05a9661fb2035031a4853bbac57f371

      SHA256

      2a65cf06638ee451757fdad3e97865f43da2cfb2c0b613bc9336358981ff8bb6

      SHA512

      0b7e1fcd321c7820a6433d143c2741fab93022d5da34882cd05ddde37fc639c4e182c228d29a9a6033dc2d64301884b410880e301471998f22550149a604e79b

    • memory/1948-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1948-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1948-4-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1948-8-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1948-15-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1948-22-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1948-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB