Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 23:56

General

  • Target

    5cf7c590c30c63364d2cf98b6ce4c420_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    5cf7c590c30c63364d2cf98b6ce4c420

  • SHA1

    11fb162e00dc5b4120bef4c7cbb862d2f05c8afa

  • SHA256

    9babdbbb3b4748787c11e2407777c1ffab8da127cc7f9dd377ecc802ea136dec

  • SHA512

    10e526612361899a57ef9e3cad67a12ccad0624530bea6a7be81eebefc353ef711f2a281ad3835e46e6c33c67b3981a9c8eeb84630cb91c859e3eb967f5a69e2

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+CK:LJ0TAz6Mte4A+aaZx8EnCGVuC

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5cf7c590c30c63364d2cf98b6ce4c420_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5cf7c590c30c63364d2cf98b6ce4c420_NeikiAnalytics.exe"
    1⤵
      PID:1308

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-m4APePa0tI0cniJT.exe
      Filesize

      83KB

      MD5

      5c777faf168628a031ba7726bc9d86b4

      SHA1

      1070ac724f207b2d52258d2bec446f46ac7d3478

      SHA256

      9b63cee9f94169b29f250efca7c4bb544e179551442b991444a0fc8c3fd7c9cf

      SHA512

      d85b8a1b3132c182c66fa9a5a63bdaddce4918a4871e5a796e2eba3912e5cf4d0f0ff9d440f8c28aee338d267e518b87b6145cea776a25645d8cd6519822edc8

    • memory/1308-0-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/1308-1-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/1308-5-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/1308-13-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/1308-19-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/1308-26-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB