Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 05:29

General

  • Target

    39a01db6e8441f164483836431b7ffa45722c6ccaaf2c1ec43fec4317cde3d05_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    4bf15deb4e076b1b21a20d10e32bc250

  • SHA1

    73fc93985c7b31283baf8658fd19ed1fa1bb0da8

  • SHA256

    39a01db6e8441f164483836431b7ffa45722c6ccaaf2c1ec43fec4317cde3d05

  • SHA512

    ddf1b55900129c9496e938d363c0962bc995eff4c0faa7f2ecf704411cb62d5b976733f55c365b17d574301fc4082e89791ce37253fa062106959144b3a6561b

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+BK:LJ0TAz6Mte4A+aaZx8EnCGVuB

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\39a01db6e8441f164483836431b7ffa45722c6ccaaf2c1ec43fec4317cde3d05_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\39a01db6e8441f164483836431b7ffa45722c6ccaaf2c1ec43fec4317cde3d05_NeikiAnalytics.exe"
    1⤵
      PID:2176

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-78F6AUpAq3jUAfHv.exe

      Filesize

      83KB

      MD5

      5931d190e430446d603fa389309f097f

      SHA1

      47599bdd7279ab15df3baaa75df92583c8d28dbf

      SHA256

      50cf6ceb65631214a2528b897ae6fd2977072e09a552e36b9f92d947c1243239

      SHA512

      277a070ec86414f897b466b1d572e80d9c585d81ce20cd3244d211b9bc95d27e7ecdd79bc4f9f9c0ee054c30f852a6a2f25fa2a7cc992f97e9f37f9a5f6ee7de

    • memory/2176-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2176-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2176-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2176-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2176-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2176-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB