Analysis

  • max time kernel
    141s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/06/2024, 12:08

General

  • Target

    5639cf43fad15aab4518f7bcbc67e680_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    5639cf43fad15aab4518f7bcbc67e680

  • SHA1

    b7178f1ff2ffc550588d7fe09e48b0e7e8d62c20

  • SHA256

    44e74144d8fcc3b1134a584ad6c5a1269e4a9162c1d1be55a5fba52716de0b91

  • SHA512

    af1126c928d7bbe99c383018c4c1c9175c7da6c130aeb19727b85ccf28ea79207c122bd3449cf4ab84374544bb1843084d0d92a640004e6cd1bc81ca75fcf913

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+ZK:LJ0TAz6Mte4A+aaZx8EnCGVuZ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5639cf43fad15aab4518f7bcbc67e680_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5639cf43fad15aab4518f7bcbc67e680_NeikiAnalytics.exe"
    1⤵
      PID:2168

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-9YAv1Tc0y64WmEo7.exe

      Filesize

      83KB

      MD5

      de75bb3f0e1830403fb68673b36c0f85

      SHA1

      956e9c8350f3701a1cbcf8a11b09be88c4423b7c

      SHA256

      79ebfda689e3fc5b5143de6581c0d353bb9db23981bf5da2d01a578eb77c2019

      SHA512

      b7da1e75ad63591dfd738ab321d40662072ed1af7885ec65b7f498bd5fa60d0f764d5089e81ebf24b97b1ff6f63718485626736387a473412a39061c6de633bd

    • memory/2168-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2168-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2168-4-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2168-8-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2168-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2168-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2168-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB