Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20-06-2024 02:48

General

  • Target

    2b48cf2c7267807b76d7a2662990cb4c0d47293b6468ecf0cc471cffea2a23fe_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    28f75bf467405480b5f9224391a4c470

  • SHA1

    5d8d5311b0275bdfbeea0b7ad24de4ec84bc0a0f

  • SHA256

    2b48cf2c7267807b76d7a2662990cb4c0d47293b6468ecf0cc471cffea2a23fe

  • SHA512

    57b28ae0b642296cb0a60c0f9380c15d156403d03a1602eac3e170e0a16d3d5883bc0647a0752a88de82df34f54fb4a8701f6a44d60ea9cbfaa8e239c8309580

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+5K:LJ0TAz6Mte4A+aaZx8EnCGVu5

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b48cf2c7267807b76d7a2662990cb4c0d47293b6468ecf0cc471cffea2a23fe_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2b48cf2c7267807b76d7a2662990cb4c0d47293b6468ecf0cc471cffea2a23fe_NeikiAnalytics.exe"
    1⤵
      PID:2324

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-guc2EZQ0JeMPAH32.exe

      Filesize

      83KB

      MD5

      761005b2d6143e2e24359cf73ac87bda

      SHA1

      49eaf2aba0a4cdd471685af9fb17952abd55206e

      SHA256

      0e8ace2542b9fe92365cc6f7abe0c6f86273c525eaad057e289a41152224e030

      SHA512

      fbbaec784a172ec8ceba9604df6c25f1e05986767fd6332e17cdb57b27e49410a50789722460ac78b0e1ca93dde89d6f99b17f4459b497559f4c325835f90038

    • memory/2324-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2324-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2324-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2324-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2324-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2324-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB