Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-06-2024 06:40

General

  • Target

    dda4e764278bf93311e5bf1527588960_NeikiAnalytics.exe

  • Size

    62KB

  • MD5

    dda4e764278bf93311e5bf1527588960

  • SHA1

    c3c3dea7ecb318009abda62c559ea3a479e6a24c

  • SHA256

    d9e96097246e319047a41307e1589373d7a487425c2887e4f847e954d618a9e7

  • SHA512

    4c6372642d914e52dcd801afea62d4c3e4ae30f8e8a986f9d30914c7907381913ddb12d36e7a244ad48760267434bde64726e9ea6288b43735a57cc4d80caf20

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8Q8/8RYBwhFztoLTat:KQSoskRY8ou

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dda4e764278bf93311e5bf1527588960_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\dda4e764278bf93311e5bf1527588960_NeikiAnalytics.exe"
    1⤵
      PID:1044

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1044-0-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/1044-1-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB