Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-06-2024 11:39

General

  • Target

    a9f891b6471c1f385036efc8374eaca6dab765336cd01e1c7003000d91474185_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    765c030e28dba36b47a714fb92287f70

  • SHA1

    03d7a3c4eeff00bf4ac114625c4009dd4561b417

  • SHA256

    a9f891b6471c1f385036efc8374eaca6dab765336cd01e1c7003000d91474185

  • SHA512

    1e26df2c567e2a6cdb8021692dab217f8f20ad20a55931b923023cd6d414a9f0da23d6297df690ba2806605ed4ab2b75579b6a84deee7bde8bb3ab4566b39d78

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+ZK:LJ0TAz6Mte4A+aaZx8EnCGVuZ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9f891b6471c1f385036efc8374eaca6dab765336cd01e1c7003000d91474185_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a9f891b6471c1f385036efc8374eaca6dab765336cd01e1c7003000d91474185_NeikiAnalytics.exe"
    1⤵
      PID:2576

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-39VUr0ZH0mRyfEaV.exe

      Filesize

      83KB

      MD5

      5e8678ba3c15863cea6618ad86ecc04f

      SHA1

      d672fa6a04c5497533f78b583d781c60ef8c6df4

      SHA256

      cf71c0a1ef56efae42b03b9412a84102f07636d2d6d464234fd22a76917d4544

      SHA512

      44e3b60eb7399f7e87914ded9236c15a61392ec26264dd0fa7fca4cbe2c3e7c459f9e3f1a8472d21f296da16498f0aa414d4f958a5c5be595796e7d0cd7bb72d

    • memory/2576-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2576-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2576-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2576-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2576-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2576-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB