Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 04:24

General

  • Target

    a6871764ec5da3454cd8cea008b612c0_NeikiAnalytics.exe

  • Size

    76KB

  • MD5

    a6871764ec5da3454cd8cea008b612c0

  • SHA1

    ef6d8331508e9dde3b0c5259be2d2bd628177cc5

  • SHA256

    d062dc8aaf63edd6f6c1d9bc7e6c7473909633d0127ac580309b05f4abf94418

  • SHA512

    939e6fac126d5ad6d21e1c4c3b520c78c477784507d19b5c8d2b2cf2d2140bdd5e3b34e5581f2e48575324d518c6b56c08e5950331731744c159cc58aab47bc3

  • SSDEEP

    1536:5lrsicagdzn8K2ariPOcjk+XQuPVN72NMSBCm78wcBKO:5JjcF8KfCOcjk+guPVjSBC08wG7

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6871764ec5da3454cd8cea008b612c0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a6871764ec5da3454cd8cea008b612c0_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    PID:1608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\macromd\AIM Flooder.exe

    Filesize

    77KB

    MD5

    cbb7121c2fa0c12f775b4ea092321101

    SHA1

    273c8eecbb26941019b3837ae8551967d84e2473

    SHA256

    94d7ecab62c66242d1ea91cf1f63515ce22b01ce860af6f628b6252523379e1e

    SHA512

    7c1e61ce4f5769a1c2bd4a9a5947fd59acc6edf1eb87ba86e859291d38441f3171914ee4fa0080ffb31ffde7476a92cb58bd8b07f69275f5fccc54c7a4030c5c

  • memory/1608-3-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/1608-34-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB