Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/06/2024, 15:33

General

  • Target

    7fff7fd54fae79703fd58300f9fb6260_NeikiAnalytics.exe

  • Size

    29KB

  • MD5

    7fff7fd54fae79703fd58300f9fb6260

  • SHA1

    71fa595a64072678c5efc53a04a332d1ee2240ef

  • SHA256

    fd358d88877567cc0a6c6076021626b5a8d66781100949f66592238a4f33ec7f

  • SHA512

    dfec0b5041de96392c9629c5dc3ef7f0213c32cc4ea7e41c4940a4dd7da5067ac2a72e12f3d42e1772cce4020459df5abad3265938971dafc92bdc6d9379fd55

  • SSDEEP

    768:ITRfpN0pOy3OzeXmOGXbJOlB2vsLCik5dAy7b6lSI:IHzzeWHXbJGB2EOik5h36lT

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7fff7fd54fae79703fd58300f9fb6260_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\7fff7fd54fae79703fd58300f9fb6260_NeikiAnalytics.exe"
    1⤵
      PID:4800

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\My Downloads\AIM Account Stealer Key Generator.exe

      Filesize

      29KB

      MD5

      678cb44860a5ff4454bfe643d5e7ad0f

      SHA1

      76318a9f5cfc9216070538dad8b23a74512257ee

      SHA256

      af2d90e240bdaacb4fbb098512489b6bb435a0f10cc2eb96ad36a813efdf45d4

      SHA512

      2e981c29d090f8caa2b57d0427274fb080b9f87c044a51f646af8e9f27ff9f9ec7a1606957f66a8e7e5c83e0c2281633c82bc550534ac4227275d9d414c3afbe

    • memory/4800-0-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/4800-101-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB