Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-06-2024 10:55

General

  • Target

    0a778164f2abfd068d6a8edc55407160_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    0a778164f2abfd068d6a8edc55407160

  • SHA1

    9e345538ef3c0cd33e6413d25d9151b0f8edf8ed

  • SHA256

    98df1abb0940432f96517b785ff4971e87ef3584e0ffbe62ea5740e5ff76685d

  • SHA512

    9fda06fff1ff8f09531cf23314603ccc25967ad20f58f31b1b46feb5845c5dc23f7c5389b472db7e2749d193a97d5424ae4d54c6dc339ba240abb4f574f1fde6

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+8K:LJ0TAz6Mte4A+aaZx8EnCGVu8

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a778164f2abfd068d6a8edc55407160_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0a778164f2abfd068d6a8edc55407160_NeikiAnalytics.exe"
    1⤵
      PID:552

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-pGRqpHHlDaNFnnZq.exe

      Filesize

      83KB

      MD5

      94ae1f1d8ac3b657bee682ed3627ca3f

      SHA1

      5c02036c45bba8ef561f1e59370abad7fd99c1dd

      SHA256

      29d521736508cc36312d96dda80d6843a765cd2f6afb22f367651c3644a234af

      SHA512

      e0509053602360098e7365ae15b7a4d5e19501ec891eec40d519d79d68bd74f1a8c8fe2e4291e3eff47068161ccc21625d4fbd60f13b8804e5fbc7d8cb4e09c6

    • memory/552-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/552-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/552-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/552-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/552-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/552-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB