Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/06/2024, 16:11

General

  • Target

    6b23a36f8ec2a0845e8758ff6c556240_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    6b23a36f8ec2a0845e8758ff6c556240

  • SHA1

    4c809df7c2d74c9a420604d489952741f48768a4

  • SHA256

    67428556b168a61e1176ab4cc7fb6d9e5d7cc8dc949d2e3f5452c9005282e2f1

  • SHA512

    eb0e00f1bde45d664d16373f8e7117e82bc4e7f21ea52c555aa286f03c2de6beb5e6bb2451a870859f48ee18c41a9aaf07af805857769b6c1cf85e2afaeb0822

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+dK:LJ0TAz6Mte4A+aaZx8EnCGVud

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b23a36f8ec2a0845e8758ff6c556240_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6b23a36f8ec2a0845e8758ff6c556240_NeikiAnalytics.exe"
    1⤵
      PID:4920

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\rifaien2-mTXkXJyZjaBx5cws.exe

            Filesize

            83KB

            MD5

            c83ab54aaf81485778e4f1366cbf0c3e

            SHA1

            97572bb32d24c31d56f3e7eb349b937f5bc5a68c

            SHA256

            3e2b275f64480f01fd7d71953750e4959e9c02f1c160376a9811f3d40f7a4d75

            SHA512

            5546f69eab73ba88e41e83e905d7a460963da7695e2ad298342e9ecaf8ba2fae45b0541296c0bc4f334803052f8f6dc8d9e78e2622cce0032a34eda6583dd1d6

          • memory/4920-0-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/4920-1-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/4920-7-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/4920-14-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/4920-21-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/4920-28-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB