Analysis

  • max time kernel
    141s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2024, 11:47

General

  • Target

    4f9f7c924fe8071f6fea9db06b0b4ea4c10078a017c89b8e872e7eb12819cd5b_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    7cadf7ba3afa6d683b69757671ae37b0

  • SHA1

    00fdfb3d73917a3803a96499f262b4e873584b7d

  • SHA256

    4f9f7c924fe8071f6fea9db06b0b4ea4c10078a017c89b8e872e7eb12819cd5b

  • SHA512

    f981a8cf5a83eaba6eac4ec2d08b4bf77ba62aa0a0db539f7a1fe346ffd8854ecc0f6cbe98f0d0e705070fd3cd0d8fd935e5494cd520b6db5c9a99a75fd2dd35

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+8K:LJ0TAz6Mte4A+aaZx8EnCGVu8

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f9f7c924fe8071f6fea9db06b0b4ea4c10078a017c89b8e872e7eb12819cd5b_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4f9f7c924fe8071f6fea9db06b0b4ea4c10078a017c89b8e872e7eb12819cd5b_NeikiAnalytics.exe"
    1⤵
      PID:4520
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4372,i,17949988676391029604,13756926835471203788,262144 --variations-seed-version --mojo-platform-channel-handle=1420 /prefetch:8
      1⤵
        PID:4968

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\rifaien2-BTBRix6VWHiHPbtW.exe

              Filesize

              83KB

              MD5

              cc6cbbbf758d5c837c58f3e46add2399

              SHA1

              62cab0aaaa94561bd9aa8c2b6ef42fa58b60c887

              SHA256

              87546cc12e642edd494c55ffbe9b1bee679e50e65ffbb82c9775660b6b95780c

              SHA512

              7be29842c2b2812e95fd1f04f9f6d41ded1d7b225551735b51be7d34643056c625949f656dd7d9a495a303cff1bdfad684df1f502133a2ca662f6e3af238fda0

            • memory/4520-0-0x0000000000400000-0x000000000042A000-memory.dmp

              Filesize

              168KB

            • memory/4520-1-0x0000000000400000-0x000000000042A000-memory.dmp

              Filesize

              168KB

            • memory/4520-7-0x0000000000400000-0x000000000042A000-memory.dmp

              Filesize

              168KB

            • memory/4520-14-0x0000000000400000-0x000000000042A000-memory.dmp

              Filesize

              168KB

            • memory/4520-21-0x0000000000400000-0x000000000042A000-memory.dmp

              Filesize

              168KB

            • memory/4520-28-0x0000000000400000-0x000000000042A000-memory.dmp

              Filesize

              168KB