Analysis

  • max time kernel
    140s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 01:34

General

  • Target

    6e98fc47215a3285739e4438341e0ea0_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    6e98fc47215a3285739e4438341e0ea0

  • SHA1

    5b8d211698cfe13c8178be336d04c63cf658b507

  • SHA256

    d23dab3cc7317fc7a72a5a1e7934dad9ce61e0d17e725dc13529fef7ab381b88

  • SHA512

    dd8e80a058c5c67cfa88948c2cde7f86227ced9f078db2dee360ba2b34c0924064a6069fbfdaa730496beede91873c89ca0a80614a32162ba3aae448870d56bf

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+9K:LJ0TAz6Mte4A+aaZx8EnCGVu9

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e98fc47215a3285739e4438341e0ea0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6e98fc47215a3285739e4438341e0ea0_NeikiAnalytics.exe"
    1⤵
      PID:2280

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-cWVJgdyo80VN6nms.exe
      Filesize

      83KB

      MD5

      373c9aba6badea239d30b90d85d11d09

      SHA1

      6ef25ccd050c8084b0e9d3525875e9fba5826532

      SHA256

      fe565e5bf070ccb6cd116761d7b5d60553a5bfc1b67b3b3dc017a473684ac323

      SHA512

      12f8ed379a2f697ee6c0d404620108712ccf71c3e2d7a548466942f36a5c6119bcceb5728b933178cbeb8dac75fe26372161210ea63b6766b86cb102fddfcaa1

    • memory/2280-0-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2280-1-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2280-4-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2280-8-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2280-15-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2280-22-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2280-28-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB