Analysis

  • max time kernel
    144s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 01:41

General

  • Target

    6fbfbc40913f3b056b84924319340900_NeikiAnalytics.exe

  • Size

    238KB

  • MD5

    6fbfbc40913f3b056b84924319340900

  • SHA1

    1d139f14c3079e8a652c7ff0ef0204df8c76d4ee

  • SHA256

    1448ee89255ea591eab854d2028e4ababfb289c6ee9e6ad2923807a49ddcd60f

  • SHA512

    d8d2c15c5aa0336cc8d3cc3ef4af63c4f4a1309e581e00963e4d044eb91a5908271685c7e954142366f399ed2bb3ae7b5fc3b60cf8b254cdd58b78b24393883a

  • SSDEEP

    6144:Fu14Nz8TToMZz1D2Hz085mqjKHUqfggbhxrbIfegMSY:FuS5NMRETn+/f/SegM/

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6fbfbc40913f3b056b84924319340900_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6fbfbc40913f3b056b84924319340900_NeikiAnalytics.exe"
    1⤵
      PID:2940

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2940-0-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/2940-1-0x0000000000230000-0x0000000000231000-memory.dmp
      Filesize

      4KB

    • memory/2940-2-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/2940-3-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/2940-4-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/2940-5-0x0000000000230000-0x0000000000231000-memory.dmp
      Filesize

      4KB