Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05-06-2024 09:25

General

  • Target

    4e1e6aae730d73d46a9b7914ef231cb0_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    4e1e6aae730d73d46a9b7914ef231cb0

  • SHA1

    c1edbb7490a8fe85bbb1c66b891876f881238ec0

  • SHA256

    9342005ac994a9e4b9c1c39c4f45d7c4b226060d31561e46ca4880f045e0b9d2

  • SHA512

    3b33080bc3bca362fbddbce384ef77324eceeb4ad044b20fc815ff147764f5029d0940cbdcd10aa683782a9bd281898ae32012fadd9757a0aa94d2b010aa7467

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+kK:LJ0TAz6Mte4A+aaZx8EnCGVuk

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e1e6aae730d73d46a9b7914ef231cb0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4e1e6aae730d73d46a9b7914ef231cb0_NeikiAnalytics.exe"
    1⤵
      PID:2696

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-85IXqOO4VJMbUyCj.exe

      Filesize

      83KB

      MD5

      e38917eccbb4df7cfb06b8b87c615015

      SHA1

      3f17004e9cd40098f6591854a09068a9f90e9865

      SHA256

      db86af8538356910c1c1e26ec0d894fd881c7f64504896c4d1c531917ad80e82

      SHA512

      71c67c7a3ca3458c8c1243c3d7e4f9890d22c24b2d423187a14f2fe110ddc33c268a7b646f680dbc7ab7cd0b8ecd3201bccc933f1ea556ae219ef66c005cb4b3

    • memory/2696-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2696-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2696-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2696-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2696-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2696-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB