Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2024, 05:38

General

  • Target

    3964d9c849fdd0adabc9d06c9078e02f5389fd81e523c49039f970feda00bce1_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    9f85880edd95a1d2c71258c7bd868390

  • SHA1

    3d1f976ede432a1dff86b52e4e2e5a39a9ec965c

  • SHA256

    3964d9c849fdd0adabc9d06c9078e02f5389fd81e523c49039f970feda00bce1

  • SHA512

    f1d02d223933825328186f70bd9e6b1595a5d65aa3feb131e8f22e4190d56b12c56c97c7cf281434375b80ed9ef6ba88a633df10aa7a92f9af7318a2f1f25553

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+tK:LJ0TAz6Mte4A+aaZx8EnCGVut

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3964d9c849fdd0adabc9d06c9078e02f5389fd81e523c49039f970feda00bce1_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3964d9c849fdd0adabc9d06c9078e02f5389fd81e523c49039f970feda00bce1_NeikiAnalytics.exe"
    1⤵
      PID:2468

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-wbGaGcIua7vs6bA4.exe

      Filesize

      83KB

      MD5

      01fff57331702fd80f6b5e64923178c1

      SHA1

      45e7b808bc56ef03594029e0a20f6dfbe06af7ab

      SHA256

      b3fca3bef274314142d59df7f142ab021907c45870b683f477f3a9e4e76b2456

      SHA512

      16c64dc9ae3afcbc64eec5eebc6c13e7a0a6fe7d7baab3bbf52ef0366ca10c74952c8b45970b183051062f8ae47944e8242ed3e20ea40844a5b2ea284296c424

    • memory/2468-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2468-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2468-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2468-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2468-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2468-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB