Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 23:27

General

  • Target

    57c2d6a2ed41496cc0345f01aec80170_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    57c2d6a2ed41496cc0345f01aec80170

  • SHA1

    041af8ad5dd7e529f349456e2f698923c8108c27

  • SHA256

    b32b91c8e66bf3b7850b372adb0d645c76fffe72d7887d3acf1e11aab30a31f7

  • SHA512

    72dd7f2db62857fab96fbd29f87d3df00573dd87e932031ae2e83f690c1d9a6582144e9c8434d0387f1f49918660af3b5414d319c7d95083d1da6773a3803487

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+sdK:LJ0TAz6Mte4A+aaZx8EnCGVuA

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\57c2d6a2ed41496cc0345f01aec80170_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\57c2d6a2ed41496cc0345f01aec80170_NeikiAnalytics.exe"
    1⤵
      PID:1192

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-5WgHJmYL1Wo6oxRm.exe

      Filesize

      83KB

      MD5

      ad1c2087a1ccfd261e841b2c1c02fadd

      SHA1

      fc4de056010d04e62e45c5ffbd2c3875dcd06955

      SHA256

      e6aab79acb70cd07ddbfa9cdc59da819bc3ac117d88f1a74084ebc81d8703a89

      SHA512

      a2ba9a6b3b9d25e0ab1d57b715540fdf96f7e575e89cfe9a83e4711351b79fbbddf1acda36f15b4d12ed056208f67110e184ea6a6ec8c0a22188be003329a6d9

    • memory/1192-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1192-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1192-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1192-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1192-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1192-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB