Analysis

  • max time kernel
    141s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/05/2024, 08:55

General

  • Target

    264516d8302de077871881364947792ddda11c57f294197f83a1c85a77c68636_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    bc8e762955d150fa04c9c362ed6d63d0

  • SHA1

    f4d004da6fdf22dca5017efdc16b0d6ab3f3411f

  • SHA256

    264516d8302de077871881364947792ddda11c57f294197f83a1c85a77c68636

  • SHA512

    4780741c9c058bdf83d4da683b921ff511eaec355c716993a0e7dde374530001e7b942cdfb0cccb7004419c73b95f7bc2917ee1c07a471e16fcf2610163634f1

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+RK:LJ0TAz6Mte4A+aaZx8EnCGVuR

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\264516d8302de077871881364947792ddda11c57f294197f83a1c85a77c68636_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\264516d8302de077871881364947792ddda11c57f294197f83a1c85a77c68636_NeikiAnalytics.exe"
    1⤵
      PID:4136

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-Jvvr9SRtCHv7Jcee.exe

      Filesize

      83KB

      MD5

      e4264274a8854d814c4224caa507e2fe

      SHA1

      4234acadd33fe8d6aadcc5b92f1ce74b6d8febfc

      SHA256

      09313d15c44cc3d78c6a75b8448a734a6427b1da4471bc8b9c627cd94d053bad

      SHA512

      470b430eebc7884b04339c97bf4b68e919f83a071b3c18dd5773acabbdf11b75c407714241e2989a3b9a2a18ddf1efbf6b9908e51ba8f5362d221d2dc8e0e66f

    • memory/4136-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/4136-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/4136-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/4136-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/4136-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/4136-29-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB