Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    31/05/2024, 16:47

General

  • Target

    e459a829f083fc4344a06c8d738ab000_NeikiAnalytics.exe

  • Size

    146KB

  • MD5

    e459a829f083fc4344a06c8d738ab000

  • SHA1

    5c54f17e13d23d1bb41ce3604004ea43a5e167c2

  • SHA256

    267bf8ec0ddb4e04051a181900e056a9fc16de37589920af49bb753a4ad9861e

  • SHA512

    2d6f02b118322c9a0a82d46730c0793b17d9b6e9325167014fdac5a006186a0fd54e98906af21095102fd37a5888f9369eaade13721ebf5063d9a3ab53322420

  • SSDEEP

    1536:a7ZyqaFAlsr1++PJHJXFAIuZAIub06GNUKTiJQbQ2ZbU+E9i:enaym3AIuZAIuCNUKTi4hlr

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e459a829f083fc4344a06c8d738ab000_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\e459a829f083fc4344a06c8d738ab000_NeikiAnalytics.exe"
    1⤵
      PID:1948

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1948-0-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/1948-1-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB