Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 23:27

General

  • Target

    57c2d6a2ed41496cc0345f01aec80170_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    57c2d6a2ed41496cc0345f01aec80170

  • SHA1

    041af8ad5dd7e529f349456e2f698923c8108c27

  • SHA256

    b32b91c8e66bf3b7850b372adb0d645c76fffe72d7887d3acf1e11aab30a31f7

  • SHA512

    72dd7f2db62857fab96fbd29f87d3df00573dd87e932031ae2e83f690c1d9a6582144e9c8434d0387f1f49918660af3b5414d319c7d95083d1da6773a3803487

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+sdK:LJ0TAz6Mte4A+aaZx8EnCGVuA

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\57c2d6a2ed41496cc0345f01aec80170_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\57c2d6a2ed41496cc0345f01aec80170_NeikiAnalytics.exe"
    1⤵
      PID:1732

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-4A3VYomP17MNFH6d.exe

      Filesize

      83KB

      MD5

      0b99e461fe8ba84b61466b25ea2f26d1

      SHA1

      26b2a543103e37515414e1fb6fc04d15594700d9

      SHA256

      6a4f4e3a56a32b1a0d95a8f69cc633e9d4455ee07f197d3e8197d562628177d1

      SHA512

      0440a0d300fc431c2951471f1b1007be8616a13e11bddb33ef198abafe27a61272a49b98065014ee62b86519c37978ef7615b6ed7a743d727e7ab44cfd99019b

    • memory/1732-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1732-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1732-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1732-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1732-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1732-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB