Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 05:38

General

  • Target

    3964d9c849fdd0adabc9d06c9078e02f5389fd81e523c49039f970feda00bce1_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    9f85880edd95a1d2c71258c7bd868390

  • SHA1

    3d1f976ede432a1dff86b52e4e2e5a39a9ec965c

  • SHA256

    3964d9c849fdd0adabc9d06c9078e02f5389fd81e523c49039f970feda00bce1

  • SHA512

    f1d02d223933825328186f70bd9e6b1595a5d65aa3feb131e8f22e4190d56b12c56c97c7cf281434375b80ed9ef6ba88a633df10aa7a92f9af7318a2f1f25553

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+tK:LJ0TAz6Mte4A+aaZx8EnCGVut

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3964d9c849fdd0adabc9d06c9078e02f5389fd81e523c49039f970feda00bce1_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3964d9c849fdd0adabc9d06c9078e02f5389fd81e523c49039f970feda00bce1_NeikiAnalytics.exe"
    1⤵
      PID:2884

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-zgNqdv7guI3DcPIN.exe

      Filesize

      83KB

      MD5

      7aa697acf07c155fd5c640157ae94e04

      SHA1

      4347f4f2f2183faeee010edfd5c6dcb2d36034ad

      SHA256

      9c54a3a97abe38b53aad8566aa0c858a1160140f687eb5cde77aefedfe6bde8f

      SHA512

      b3f95f736ff0e4a77341f53e515ac9aa39697d49e095a6b61dd266f382721867161d9c326dfa3b0fb584b156f802f990d3fe68bb4a35a0d6576ba1c3c9021f9d

    • memory/2884-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2884-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2884-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2884-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2884-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2884-27-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB