Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 23:56

General

  • Target

    5cf7c590c30c63364d2cf98b6ce4c420_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    5cf7c590c30c63364d2cf98b6ce4c420

  • SHA1

    11fb162e00dc5b4120bef4c7cbb862d2f05c8afa

  • SHA256

    9babdbbb3b4748787c11e2407777c1ffab8da127cc7f9dd377ecc802ea136dec

  • SHA512

    10e526612361899a57ef9e3cad67a12ccad0624530bea6a7be81eebefc353ef711f2a281ad3835e46e6c33c67b3981a9c8eeb84630cb91c859e3eb967f5a69e2

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+CK:LJ0TAz6Mte4A+aaZx8EnCGVuC

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5cf7c590c30c63364d2cf98b6ce4c420_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5cf7c590c30c63364d2cf98b6ce4c420_NeikiAnalytics.exe"
    1⤵
      PID:3228

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-zxMcfqzbFNIjzezn.exe
      Filesize

      83KB

      MD5

      67023111e6a6deece0e4b49381012650

      SHA1

      a62dea8f6ca6d8292777199c926daa7a7ec3b890

      SHA256

      6c93c7ee628b48c700d1324fadbbbc2551a6223ed4fbe06087bf0dde95817a1c

      SHA512

      36034ba3ffa6d4aa55f69b6f0739d7e5874c979ef5a4263d50e7c49f896bfada9f2de05859a1a61df257cf9e6879360132ad7d45387b54c1f98cf9db72807600

    • memory/3228-0-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/3228-1-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/3228-7-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/3228-14-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/3228-21-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/3228-28-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB