Analysis

  • max time kernel
    0s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2024, 01:53

General

  • Target

    2ca05621d9bcca297fe19cd9feeb3c50a6d78ff30db9599038b972e30a8be71e_NeikiAnalytics.exe

  • Size

    1.5MB

  • MD5

    8320ae61bdc39276fd9cf91d8f7e0420

  • SHA1

    20ce4c507745fc87c789939e9867d01d3e8e39ea

  • SHA256

    2ca05621d9bcca297fe19cd9feeb3c50a6d78ff30db9599038b972e30a8be71e

  • SHA512

    d15ca374b7ec674195de77bcfdd99918701477ca54e2a22c88560f71ef2a895b76edadc7cc5ea7c3eed9ac9648ebbc95d4ff6258271fe498ec8414ae9f8c1493

  • SSDEEP

    24576:fudFVoGw1Gj7R33pS68qPHiV2qxraRVcKiOmv6a/de9HGala+GC+xDgTUO9o:fuDVozYRnpS6hUrwbIOK6a/dszgRLO6

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ca05621d9bcca297fe19cd9feeb3c50a6d78ff30db9599038b972e30a8be71e_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2ca05621d9bcca297fe19cd9feeb3c50a6d78ff30db9599038b972e30a8be71e_NeikiAnalytics.exe"
    1⤵
      PID:5044

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\ESeries\SETUP.EXE

      Filesize

      44KB

      MD5

      dc38a8baa941f7f7529b2ee1e2714921

      SHA1

      498fe8be404bb3fa4af4da3704566467d09629b1

      SHA256

      23df73f98b4d65d555d57742afe5a7ed84e72383cef6241b7ccbe49419e97614

      SHA512

      6919fa5ad1f786917009d94b42ee95ffa24a3502283a3858ab39bf6ab8458bda2239fcf3a82242ebe9d969b5a3c55cacf93de595061feb9228455ddb93fe6584

    • memory/5044-0-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB

    • memory/5044-34-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB