Analysis

  • max time kernel
    140s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29/06/2024, 22:30

General

  • Target

    06dfe25ad519203aad94e35dc7bdb97aecbba7b0c61f4fd1dee34a9d66bd4db0_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    fd98b9b28ce240c89dffb5fba6b0c060

  • SHA1

    52d43b7908a0d89c484d96ce6504699ef3d05a5b

  • SHA256

    06dfe25ad519203aad94e35dc7bdb97aecbba7b0c61f4fd1dee34a9d66bd4db0

  • SHA512

    60a187d5912586af928bca2d54224529997d4f90c7fa7dbdb9f27275b6071c0763d9efff364252b98c6b56b858590133620eef10e1c8011ba47a0be014de3cf7

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+rK:LJ0TAz6Mte4A+aaZx8EnCGVur

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\06dfe25ad519203aad94e35dc7bdb97aecbba7b0c61f4fd1dee34a9d66bd4db0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\06dfe25ad519203aad94e35dc7bdb97aecbba7b0c61f4fd1dee34a9d66bd4db0_NeikiAnalytics.exe"
    1⤵
      PID:1364

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-nrPBvsJU4sbKNiCM.exe

      Filesize

      83KB

      MD5

      c8409ad12b9d9d0dcc18ca8ab5d0eca0

      SHA1

      e9ab35c0b081b50bba081a46eaf643d9bee6b96d

      SHA256

      6f7ea4f8cc101db94e380ae1769294e7fc8bf220e28b4ebc6bacb0cf7ba755ec

      SHA512

      979f02750e4e06e87fa86d45757d18f07a7eef1fffa01a4cb26fc4ca5e8f991fc3e17b8034329e1c2e1e7c4703bc49f1d59ce01aa22b05f10edd6c7b71b0a36d

    • memory/1364-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1364-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1364-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1364-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1364-20-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1364-27-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB