Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    01/07/2024, 06:57

General

  • Target

    3dd0f4ccb4e5129c0c3b2792650e78763da3a75aab60bf39b5be1a45c7cae719_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    4ee9172fee6f7e7ae2264d14e61a1e40

  • SHA1

    f6dcc80643661f9072201fcf18076db69a3c8c69

  • SHA256

    3dd0f4ccb4e5129c0c3b2792650e78763da3a75aab60bf39b5be1a45c7cae719

  • SHA512

    ddb714c97eeaee860c9b318be97bcc3af00aec9eaf2d8560f8c6882e783c8110f769eb787559abff25916d3b52179001b73b83bdc6c765a93bc1b249bec37aa1

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+GK:LJ0TAz6Mte4A+aaZx8EnCGVuG

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3dd0f4ccb4e5129c0c3b2792650e78763da3a75aab60bf39b5be1a45c7cae719_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3dd0f4ccb4e5129c0c3b2792650e78763da3a75aab60bf39b5be1a45c7cae719_NeikiAnalytics.exe"
    1⤵
      PID:928

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-6kVfNyawOfalRkgY.exe

      Filesize

      83KB

      MD5

      e9e58b507eede3bbc62773d1ded0ae70

      SHA1

      0d96a5981ed42e44e3d10006d67e165f720a5ce5

      SHA256

      087c74058d8df15a54672e5dac53b3467c963c8ca33012f3732211a722289e19

      SHA512

      f123fb24227305e8fe481eb20580b3b41865f56577166d46966d0133e91b0839005d611ed79cad94b7a00ada5413e1cf810a13d93c2b896080dc25e59483a5ca

    • memory/928-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/928-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/928-5-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/928-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/928-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/928-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB