Analysis

  • max time kernel
    141s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 04:02

General

  • Target

    a2496010abd6903b4c237c211b6b7e50_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    a2496010abd6903b4c237c211b6b7e50

  • SHA1

    8aff9f961f79f4dcf9d096948a4a6f3a180f3652

  • SHA256

    3b0e36fd0214cf926918ad82fec97868ca187e9d58d54f69bec9c128526c1c7f

  • SHA512

    4c094de4306defd35580195eccad11705e147cfb59ff1461141de3ed115b879d3ea111d548cfb18b91fe87a7e341f95e6ebeea5e94918c1fe4c81886a09ef636

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+AK:LJ0TAz6Mte4A+aaZx8EnCGVuA

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2496010abd6903b4c237c211b6b7e50_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a2496010abd6903b4c237c211b6b7e50_NeikiAnalytics.exe"
    1⤵
      PID:2872

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-lF7ZWWFSmPdflb8m.exe
      Filesize

      83KB

      MD5

      d86e0cc1f82949a9467633b6e17ff8f1

      SHA1

      ef77845e795aa48a008e3fe35ae7a0df0ad96d74

      SHA256

      3eadaaadf9b6660baa7d9d0612495d4b2162bdf8bd425d1aa7845ccdd12e9b04

      SHA512

      9e8f61dc4954c127a17e703b7c5c54690319048b9809b89622e3e664ccd02de3a50eee1a08d9dcb6984e8d29ddd6e6a371ef437e33efe278df71dbc0b569075f

    • memory/2872-0-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2872-1-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2872-5-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2872-14-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2872-20-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2872-27-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB