Analysis

  • max time kernel
    142s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 13:34

General

  • Target

    55bd93fee5810afc92c1bcca8ea2428a8b3cad0e888844d0afac8d8149c6caa2_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    9b2c71a268d92932ca8de0cbf3740aa0

  • SHA1

    c0e860559fe4c250371f8f4ff8e7b6e687cacab1

  • SHA256

    55bd93fee5810afc92c1bcca8ea2428a8b3cad0e888844d0afac8d8149c6caa2

  • SHA512

    f0a74a50bf144daa118c4b195f51859991ccdeb3b58137de29a0daf7793da836928ab8381642ae758579054013d377bf30ed13a3bb8407f203d091f31e301dbe

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+tK:LJ0TAz6Mte4A+aaZx8EnCGVut

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\55bd93fee5810afc92c1bcca8ea2428a8b3cad0e888844d0afac8d8149c6caa2_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\55bd93fee5810afc92c1bcca8ea2428a8b3cad0e888844d0afac8d8149c6caa2_NeikiAnalytics.exe"
    1⤵
      PID:2576

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-87WyI96xAb330SoT.exe

      Filesize

      83KB

      MD5

      b0c649e0abf005179badaae95f1ca810

      SHA1

      71be6a936cf88e587d4c02e2057b97b638eeafa3

      SHA256

      f0f083622e9eefe955654d824e2b7b2e71f29f23e5133dddf4f81959fc421822

      SHA512

      5d7fab56a4ec72111e0027db9f649dafe738f316d0683935fdeaef9791407bb2d0cdf1a195000894c8a5d9be983d5565187db8639845675b33a443ead3706f25

    • memory/2576-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2576-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2576-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2576-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2576-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2576-26-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB