Analysis

  • max time kernel
    141s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 00:57

General

  • Target

    672541e6c59bea42494bd86667972f70_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    672541e6c59bea42494bd86667972f70

  • SHA1

    2ffe61f52a9b5669d2c4fddafab07a5ab80f5655

  • SHA256

    43b8dc6eb4762eed6519b61b3fdf38680c73fa2e2693336cf6dc4521fb21f819

  • SHA512

    09a1a49df43fb78f91c815c6829aff593640eca00a308c668ea5034d1e88c8bdcf00fef29351d8e61a576657f692e292921578bf430c18094c420984b72e4f2f

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+BK:LJ0TAz6Mte4A+aaZx8EnCGVuB

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\672541e6c59bea42494bd86667972f70_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\672541e6c59bea42494bd86667972f70_NeikiAnalytics.exe"
    1⤵
      PID:2184

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-CgCDFZHlfwBBvxff.exe
      Filesize

      83KB

      MD5

      65b86087de2f9918cc7144c0a1150f13

      SHA1

      d21ad4e7550b5f4156ebbd8a193d2ed258ba2017

      SHA256

      5193f2c9ba8742dfa3df82b4e18b83a7cd59d8cd2bd1b06d3783af3f3081eee9

      SHA512

      a87e2122de2dd8ccf327bbf37dbe92a9147f84c778c63ff7dc0e4ab4c0f488f720dcfd12c20f8aab83e76fd2e5a76bbbe143a4a1f47a09dc2918cbd51ee08255

    • memory/2184-0-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2184-1-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2184-5-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2184-13-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2184-20-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2184-27-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB