Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 23:53

General

  • Target

    5c5ec46523a187deeaec7abd5de12da0_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    5c5ec46523a187deeaec7abd5de12da0

  • SHA1

    11953e7d449ff49aa85731cb1286f04e0c302a00

  • SHA256

    d5d98837d483ff927abde47297fee94f5508bf701eeadc3b6032614c466f5c82

  • SHA512

    57508dad19372ac9861799758dfb0081618c1ace2376db996914ab1cc5222ec8a9c1b1e93a375e83d3f6e6331ba0935d7b16131e7429cd9cf28ab2c72563849a

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+7K:LJ0TAz6Mte4A+aaZx8EnCGVu7

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c5ec46523a187deeaec7abd5de12da0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5c5ec46523a187deeaec7abd5de12da0_NeikiAnalytics.exe"
    1⤵
      PID:2408

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-1XolCdC6dTyerwHf.exe
      Filesize

      83KB

      MD5

      d081b47229ffe04af3ba63e7f59bda60

      SHA1

      0c70a57db41abdca5500d44cfca1103c95ebd1fd

      SHA256

      dc4b3a850676e26a1a9afc3101c98dc0f59d03006d485806e31c1e90a7344bc6

      SHA512

      5d849ad893f0814773b3a3e32c32733566005005dbf6b74c47b2c55dcbd956c289c630aa8c0fd04bc94f825bf6e5d751892ab351b6d8f92c7f4913d85f0a999f

    • memory/2408-0-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2408-1-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2408-7-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2408-14-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2408-21-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2408-28-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB