Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-05-2024 13:55

General

  • Target

    5a2566f7452e2f485884b82c5b6119421192f9dbd8359fac0bbe7b20a22e6a97_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    5f14bdfff4a588383424c51b94facf50

  • SHA1

    803d45853df8d193c0496d8447746ef97619b1e0

  • SHA256

    5a2566f7452e2f485884b82c5b6119421192f9dbd8359fac0bbe7b20a22e6a97

  • SHA512

    e3019c358eb2acd1a65d1c1e59fc20348af553fecd1a71ee00996d4c2d39477f0a1d44a50fb6dec03a308102b429fa29392dc0c3211412375dae990e72affb78

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+jK:LJ0TAz6Mte4A+aaZx8EnCGVuj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a2566f7452e2f485884b82c5b6119421192f9dbd8359fac0bbe7b20a22e6a97_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5a2566f7452e2f485884b82c5b6119421192f9dbd8359fac0bbe7b20a22e6a97_NeikiAnalytics.exe"
    1⤵
      PID:5108

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-Ey4VBtlmf70rEKQt.exe

      Filesize

      83KB

      MD5

      0475445b1a349492076407cc5330c9ba

      SHA1

      bbe29bcb1a63adc8ab2767dda4add93cf3bd600a

      SHA256

      b32a07913a0d584192df9f81728b4ecbf15da55afc64493041411e98505eb3c0

      SHA512

      3627ec6986bad0abaa2bf2b98f70dfc15d01993eb3060157663a67f268d7e624d1b0282345791e19d9cb7763ae1284506e53e864df5d53162c0d58d145f2ef97

    • memory/5108-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/5108-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/5108-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/5108-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/5108-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/5108-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB