Analysis

  • max time kernel
    140s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/05/2024, 07:45

General

  • Target

    4b4a5590eed80062bae2ccf1f0f3b5b0_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    4b4a5590eed80062bae2ccf1f0f3b5b0

  • SHA1

    9dd76f5c071f125d7e6f54902a14cd4bbbc90b60

  • SHA256

    e7512bbb54e0d3d0af261e72643071628f5addbc093ac22feacade4c1733ff51

  • SHA512

    c0554c3b20ea6bee2cd278dc9a8d617ad3ab00220cf42ae83508808904ae5d034c85a2797eb6f2efe00e7f48a913bd78dd4a004d0999a51e836ff93952a3c6e4

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+SK:LJ0TAz6Mte4A+aaZx8EnCGVuS

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b4a5590eed80062bae2ccf1f0f3b5b0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4b4a5590eed80062bae2ccf1f0f3b5b0_NeikiAnalytics.exe"
    1⤵
      PID:4268

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\rifaien2-DoiwzBhp5tOcJfJl.exe

            Filesize

            83KB

            MD5

            879b6ce4416b1f00bc22396eef1a1243

            SHA1

            e7713cd80aff5050d10a2d295d8006459e11e99f

            SHA256

            fd7216c9e4f46cb4c68d38ad6e442e4d83039cfab7dcd8a86b6704756d9289ef

            SHA512

            df1ac98376eb0b9bf85945a88d671e527bf182ce759a75d114e1709d8f301d8d658662594dce48f02ba46ff04429164c20c4a24bf8acc9062fe2a2aa7bc45cfc

          • memory/4268-0-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/4268-1-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/4268-7-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/4268-14-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/4268-21-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/4268-28-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB