Analysis

  • max time kernel
    141s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/06/2024, 05:49

General

  • Target

    541f0d588f4febb85347ba88df7c4110_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    541f0d588f4febb85347ba88df7c4110

  • SHA1

    fd3e479f912bc303001fcc3e95d9c7bbac31a15b

  • SHA256

    0e9886f1c6219673e69032cfc7ae6828fcd02403d959a7d47cdf2914ad10f543

  • SHA512

    f7ebce3d1888d987d14be19e20350d59ba53f22795d0329a795cf2dbc32ec794b65cfa49fce47a6f0bbd1064ed982644c4161e60f4a5ee9b4edd739db1f744bb

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+IK:LJ0TAz6Mte4A+aaZx8EnCGVuI

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\541f0d588f4febb85347ba88df7c4110_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\541f0d588f4febb85347ba88df7c4110_NeikiAnalytics.exe"
    1⤵
      PID:5076

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-5AdMELoCjJ3K4zi4.exe

      Filesize

      83KB

      MD5

      959982b016cf61db299615746693affb

      SHA1

      c1ae378e30dcef1bfb0fbf330b6b6489695b0601

      SHA256

      12ee9d0fb37ba0c93e0e815f4ea25c90b1a43cba516c299058e9f3bd38676f25

      SHA512

      38e8d39d6510ea4f1fd212db48ea2225a09ff849ca53300b8bff35015f8f325c58647cc0a0c41925b7787bb6cc5c8ac0ce85eb2b9753eff25db1ed98d361c417

    • memory/5076-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/5076-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/5076-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/5076-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/5076-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/5076-29-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB