Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 22:33

General

  • Target

    1b720f9f24b00c8c765f281bb5c3cfab228ff5325d6c3dd012488a77c647983c_NeikiAnalytics.exe

  • Size

    6.8MB

  • MD5

    79d9423502a9f99e7f2ab88361483b30

  • SHA1

    50fda6b7d426eea3d8e1e61bad1a38c7ecd7f4d0

  • SHA256

    1b720f9f24b00c8c765f281bb5c3cfab228ff5325d6c3dd012488a77c647983c

  • SHA512

    37db94c95ceb34c2baa11a3ed43b198c8aa02c3338d2caab60d1e728d6a9620c31469e77ba5fed6801925dc4f953f74d305f27bd32e7d716f42774c866b8f753

  • SSDEEP

    98304:llg4444444444444444444444444444444444444444444J:lz

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b720f9f24b00c8c765f281bb5c3cfab228ff5325d6c3dd012488a77c647983c_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1b720f9f24b00c8c765f281bb5c3cfab228ff5325d6c3dd012488a77c647983c_NeikiAnalytics.exe"
    1⤵
    • Drops file in System32 directory
    PID:1844
  • C:\Windows\SysWOW64\svrwsc.exe
    C:\Windows\SysWOW64\svrwsc.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    PID:1584

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\svrwsc.exe

          Filesize

          7.2MB

          MD5

          37f12f5860c748ca8a2deb8913b094f8

          SHA1

          d8a12bf0e54ec5ad33b893312532bb0bc6e73947

          SHA256

          2bf6fcd868ac4cb5bb6be80f62b1707e49bd2dd5a0d7dae1a22fa0b759142196

          SHA512

          7449f86701852a1b6bee752138967a47015cf20329560ff05ce9c64150b45cfa684d163fc9b3ebbe679b5f3edf0571f8afedeec7f24ea9ce0f1ac3d5bc5b9872

        • memory/1584-5-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1584-6-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1844-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1844-1-0x00000000003B0000-0x00000000003B5000-memory.dmp

          Filesize

          20KB

        • memory/1844-2-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1844-7-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB