Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 00:52

General

  • Target

    66228c94260c38ef58d466613210a660_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    66228c94260c38ef58d466613210a660

  • SHA1

    90e2f083cc1d04ba5c04924ed01fe650afd7fd96

  • SHA256

    f1e6292a7303ae56098ca6be6413c9f9bada2944162dfe1627a1e3eddfe1adf7

  • SHA512

    fe31b69ddc56810cca686024edbdb7fcb9d4c30d3df9aae3edfc7944d086a590b53178d4c18b956cce9e7d654abdb0f745a9714d94b522596cc781fa689c4d8c

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+IK:LJ0TAz6Mte4A+aaZx8EnCGVuI

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\66228c94260c38ef58d466613210a660_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\66228c94260c38ef58d466613210a660_NeikiAnalytics.exe"
    1⤵
      PID:3676

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-iAR6wX6IN0narUKm.exe

      Filesize

      83KB

      MD5

      522ad3df396a060ad2e4b6d15dde9768

      SHA1

      2813e0d3b6042af9de6c658526493f0dcac7ba41

      SHA256

      082552766a92ad195a62eff75e4c4b3dc76877a3a9247a4c36386ceb03a3adfc

      SHA512

      ad3d8e80910cb4512a0d8a1dc67bf5f1ea7463612ac37e405cf995b170346acf25c8c4403732b7808b4d99410861ffc1a4e5b1068ffa7a991d32d357b89a01b7

    • memory/3676-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3676-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3676-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3676-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3676-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3676-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB