Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    25-06-2024 04:41

General

  • Target

    305c46683b95746e2ec25d71325dd5ccb97e541f41b02d8760382f44f5c73b76_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    aba61398e23a300ea86f1a02f3669fb0

  • SHA1

    8c4d63f0a7b0a44b96dff28101044ba32ba4ac7f

  • SHA256

    305c46683b95746e2ec25d71325dd5ccb97e541f41b02d8760382f44f5c73b76

  • SHA512

    94d38a19a981f60c33505bc50df46fc46822add9063d6ab3f8c989d7d44b8e7d74c09e162e46bda28aa3517d3f3efac769d98e3245eac63f8cd187b34d8cf6cc

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+3K:LJ0TAz6Mte4A+aaZx8EnCGVu3

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\305c46683b95746e2ec25d71325dd5ccb97e541f41b02d8760382f44f5c73b76_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\305c46683b95746e2ec25d71325dd5ccb97e541f41b02d8760382f44f5c73b76_NeikiAnalytics.exe"
    1⤵
      PID:2424

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-sWEltR4evQuaGUfK.exe

      Filesize

      83KB

      MD5

      ec22999f63ea7835f63125c4b188d2ab

      SHA1

      ed6a07f90f9dbb65ca425542158e3157b3494786

      SHA256

      90c6757ad1851300320d7716abaa7d006bb4f08d2763455cc48b69f05b38a284

      SHA512

      ec4ac9c7d9b9d439c85db8988904841984ab8c55281c6b67affa8f3d435353396d8a30dd5e1b6bb42777355112d3f7e05cf4e9937da6232be63d08606531800a

    • memory/2424-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2424-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2424-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2424-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2424-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2424-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB