Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-06-2024 12:03

General

  • Target

    83e649630c5b241bd480981c3a948e90705cac56b34d4d74d361dd551bb00e78_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    8e4f337492e002a0db5d80029eee32c0

  • SHA1

    627ac690c1c84a93e17dcf8a422974de28ff5541

  • SHA256

    83e649630c5b241bd480981c3a948e90705cac56b34d4d74d361dd551bb00e78

  • SHA512

    32e3e2aa4f4df1777f685d3b33e79fdfdba58c3e36a7ab20c05c9d3d21417c7e138a4e6553412647f4afe47745fad19aee5d118ddc20b8593cbfebffb97e230c

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+lK:LJ0TAz6Mte4A+aaZx8EnCGVul

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\83e649630c5b241bd480981c3a948e90705cac56b34d4d74d361dd551bb00e78_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\83e649630c5b241bd480981c3a948e90705cac56b34d4d74d361dd551bb00e78_NeikiAnalytics.exe"
    1⤵
      PID:332

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-qCYtPwhJqosFiIVv.exe

      Filesize

      83KB

      MD5

      449271a60f74e10adb24d198a8212bef

      SHA1

      bdfc5157525c8e7512da7139af7d605f1a73b7f4

      SHA256

      c849b535f254023d2336c414c0dfa6e3b997d2347739b0aa47e66ff76d619a6b

      SHA512

      87b0436b9eaff8788cd5056c1b3006ad88c4d36fee8323fc3067533f0d1d9dca858f7c808ee8b6e73f61cbde45b97a4edb1d55f9609a87ad07db20fcba25d4b7

    • memory/332-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/332-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/332-4-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/332-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/332-13-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/332-20-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/332-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB