Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    20-06-2024 05:04

General

  • Target

    374896714e9024c89c445cbc18cc75d51474e3e285dba06c2b96a07865154944_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    0c945c424b55da427a1007a6d925a310

  • SHA1

    0adf7658b7e8b9b5b02973080b4e38f47220f4c6

  • SHA256

    374896714e9024c89c445cbc18cc75d51474e3e285dba06c2b96a07865154944

  • SHA512

    8989a37c01314daf07f34caa788e4d90d9588b56f3c69f7cf9b6c8bba5fee6696010bb96483ffee4ac1d511a70dd63f4a5404c7a5cc90945588d59a6e30ffe7d

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+WK:LJ0TAz6Mte4A+aaZx8EnCGVuW

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\374896714e9024c89c445cbc18cc75d51474e3e285dba06c2b96a07865154944_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\374896714e9024c89c445cbc18cc75d51474e3e285dba06c2b96a07865154944_NeikiAnalytics.exe"
    1⤵
      PID:2728

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-XpGK6FohMvCOFbgT.exe

      Filesize

      83KB

      MD5

      a8e9077e03e28beae80070943441a506

      SHA1

      f2517433b244b7985fb22fc906387d9b5e4cffa2

      SHA256

      c7c404465c0e6d4b8c3bab50464d531a2e2a2d98d282a9a47fdb251c56bd75ee

      SHA512

      74cfa286f85bc5ff5e865f67400b5c7f8741eb62c5ccc4548234a0bcf9f9eaf3e7905a3c760720c455d975d4527b985d7cf16e4a057009439b76c8996b343dc7

    • memory/2728-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2728-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2728-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2728-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2728-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2728-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB