Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 11:39

General

  • Target

    5ae29038005e212154df360281d6f011e2dacf5da6c95a1b8330832ce22dc674_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    a7bc769eef36cc5173599255fff22690

  • SHA1

    4a711945e44645cd0fbaff227eacd06debe48191

  • SHA256

    5ae29038005e212154df360281d6f011e2dacf5da6c95a1b8330832ce22dc674

  • SHA512

    7272473ee0b1d3cb1c40fe28888556fc760ba127ccc10f6dd152657b923a4cfca90bdb7486be2a7d0011359096e828034c5670bce69ecad7a2a497a97a0b7c1f

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+rK:LJ0TAz6Mte4A+aaZx8EnCGVur

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ae29038005e212154df360281d6f011e2dacf5da6c95a1b8330832ce22dc674_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5ae29038005e212154df360281d6f011e2dacf5da6c95a1b8330832ce22dc674_NeikiAnalytics.exe"
    1⤵
      PID:2536

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-j9vi5JKp4fFUZ8ih.exe

      Filesize

      83KB

      MD5

      1ae8e0d9c363034ce94263da11a35a37

      SHA1

      fbbdcdc8da06c88f6ceb8780e5db7952998de5b1

      SHA256

      8e07b527cb1e5138491aba286ad7de40877505b149a37ce219bab600321da341

      SHA512

      4592a219b772e82f4743fc2ac28fa5cc54181e063e1eaeebd3ed8355735c67bd8b1581420f6c38cf5b834ff4f23b947bbe420851fd2296259003449064e8801e

    • memory/2536-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2536-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2536-4-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2536-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2536-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2536-27-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB