Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-06-2024 23:02

General

  • Target

    0ea93ec5e7e2124bdf9291bb66a842f0_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    0ea93ec5e7e2124bdf9291bb66a842f0

  • SHA1

    3a9066b1a18ee85fc2668796bed30a9ec75943a3

  • SHA256

    da624b32e021377a9de98ed2da9c7cdb308e1ffc90281c9d351f262fa64485ab

  • SHA512

    da438012a691727bc8b11523f1a818a408da2ecac5b63ce22acd69744cef9449f4fec13622212c311a668563578cb8dda577939209f17a51379c993122de67f0

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+iK:LJ0TAz6Mte4A+aaZx8EnCGVui

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ea93ec5e7e2124bdf9291bb66a842f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0ea93ec5e7e2124bdf9291bb66a842f0_NeikiAnalytics.exe"
    1⤵
      PID:2500

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-xOMFFzUQMDgnDr4Z.exe

      Filesize

      83KB

      MD5

      238f302f7747ce5e1216263c8f7a9761

      SHA1

      145c441471ceaf7f64f2a33c4a5cadacce632e57

      SHA256

      c5a7d6c220e85981e916faea3d5c97ae2d9a34a3b9cf5b0a3577b17a0c130157

      SHA512

      77c6305303afff2857e5f6a4324735ed146aa025d9c8b78c06772676f4b35296b2741de30b256c60921d2f8766fd0915a6f69bdffe7691841fb300aaf8d57979

    • memory/2500-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2500-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2500-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2500-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2500-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2500-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB