Analysis

  • max time kernel
    141s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    20-06-2024 03:38

General

  • Target

    2f69e5ea0244ce791ddf49d94581db7e7f763022e3fd00316a993b35663b6b1a_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    a76a6b1cc69af9bb423185109a0a4d20

  • SHA1

    33379fe9e94c43bb62b1a1eb298cd619e994c4db

  • SHA256

    2f69e5ea0244ce791ddf49d94581db7e7f763022e3fd00316a993b35663b6b1a

  • SHA512

    e73fae47405c75d04e8baccb1575f195b58888014258310953d77b8ad4b4befdf80b7281fc101f81e45280f758f4685586f23bcb9509df9f07c426a6c969e294

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF++K:LJ0TAz6Mte4A+aaZx8EnCGVu+

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f69e5ea0244ce791ddf49d94581db7e7f763022e3fd00316a993b35663b6b1a_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2f69e5ea0244ce791ddf49d94581db7e7f763022e3fd00316a993b35663b6b1a_NeikiAnalytics.exe"
    1⤵
      PID:1884

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-v6KDyfI1Vw58tNMm.exe

      Filesize

      83KB

      MD5

      f1a59b12a4854d6b537cc093489cae90

      SHA1

      aaae5b2c5da9fde94650052dfe15444e48bf29c3

      SHA256

      9d8aa422fac0788303af47100e4f2695c13fc17ce9fe60fff13bb2d180c6bcdc

      SHA512

      14bb7dbd05324ba0854e7e608a5ae0b01a9e23f7db1931974bd48e27d2b7bafdef7c0cf53b0e84e28201f12bfb45555d3c6ed7d1d54576ec550dc6d160746c39

    • memory/1884-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1884-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1884-5-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1884-13-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1884-20-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1884-27-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB