Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 10:38

General

  • Target

    551b169a85f8bc2caa3849d5e80d50441876a77034e7515ee760a3b8754dedd0_NeikiAnalytics.exe

  • Size

    1.4MB

  • MD5

    df4f58979d786122fbd0e03450020b10

  • SHA1

    b3887254894fe041153ef677ca2c5fc5b19100bd

  • SHA256

    551b169a85f8bc2caa3849d5e80d50441876a77034e7515ee760a3b8754dedd0

  • SHA512

    8b01f888a80a81b48acecca5a3ce2f6345fb6a696afcdc9ab6a767521ab39201abf5b737f56ec2cf770a8a0651dd6abfca2814ad22c86bd58ad15187843fd026

  • SSDEEP

    24576:Y9RjW6D0pgyLbB0RvfTZaqdiXSp0c02uFG6dAk3CMB:Y9RjWSKGR3TZaqdwk0c05HGiB

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\551b169a85f8bc2caa3849d5e80d50441876a77034e7515ee760a3b8754dedd0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\551b169a85f8bc2caa3849d5e80d50441876a77034e7515ee760a3b8754dedd0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2388

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\SkinH_EL.dll

          Filesize

          86KB

          MD5

          147127382e001f495d1842ee7a9e7912

          SHA1

          92d1ed56032183c75d4b57d7ce30b1c4ae11dc9b

          SHA256

          edf679c02ea2e170e67ab20dfc18558e2bfb4ee5d59eceeaea4b1ad1a626c3cc

          SHA512

          97f5ae90a1bbacfe39b9e0f2954c24f9896cc9dca9d14364c438862996f3bbc04a4aa515742fccb3679d222c1302f5bb40c7eaddd6b5859d2d6ef79490243a4d

        • memory/2388-5-0x0000000010000000-0x000000001003D000-memory.dmp

          Filesize

          244KB

        • memory/2388-7-0x0000000010009000-0x000000001000A000-memory.dmp

          Filesize

          4KB

        • memory/2388-10-0x0000000010000000-0x000000001003D000-memory.dmp

          Filesize

          244KB

        • memory/2388-9-0x0000000010000000-0x000000001003D000-memory.dmp

          Filesize

          244KB

        • memory/2388-8-0x0000000010000000-0x000000001003D000-memory.dmp

          Filesize

          244KB