Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/06/2024, 11:30

General

  • Target

    0db4d883f04832b9c33db25502e65e10_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    0db4d883f04832b9c33db25502e65e10

  • SHA1

    dbbdb90ef4386480c3556eab1879329900000334

  • SHA256

    aa72984be615a4bd67bf8c8dcbed706d782986b09ae3365ecde9033446c6c12b

  • SHA512

    b4f63b49254622de7d52d5937ce2236b0533928e32a8fbca2273232cd73406269eb199090e9d62de115a8344e9132d0a7747301d82d04d5c15c13c70c1bd9d45

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+pK:LJ0TAz6Mte4A+aaZx8EnCGVup

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0db4d883f04832b9c33db25502e65e10_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0db4d883f04832b9c33db25502e65e10_NeikiAnalytics.exe"
    1⤵
      PID:4012

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\rifaien2-utFzdLnpexohB0UK.exe

            Filesize

            83KB

            MD5

            c571991d8805baf0a894f0091d08d574

            SHA1

            6a0de0839565eb1db086330e564e7700adaa1145

            SHA256

            65908f3c67c86857fd80f7704d01431dd29e2e4a442490f694e719274b3a3907

            SHA512

            ba5b875438ef6e1588eaf0d7f69be62440668f4fe7f2e5ff4f2d745b48b04bed5f97d9ade9c6b7ec359f64be65f875142ce83053056237e483106cfcd1112d6e

          • memory/4012-0-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/4012-1-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/4012-7-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/4012-14-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/4012-21-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/4012-28-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB