Analysis

  • max time kernel
    130s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 22:10

General

  • Target

    0ba7a1a3422bb3d28c675e0ad089f030_NeikiAnalytics.exe

  • Size

    860KB

  • MD5

    0ba7a1a3422bb3d28c675e0ad089f030

  • SHA1

    7e294c92b449d6e8a89ef763c6e0528fdb0cabae

  • SHA256

    159c64ddb7b4489fbeab85f4773095cec20534c2655ddc49b44c03f0b1822bdf

  • SHA512

    98d13ead17c0f9d610b635513cebf73fb59bc0c8f7341dd81d96a0abf72387c80661a072c0921e36d59c5fc34f6a947e046ba9056a55e6c9dd95788a2a514491

  • SSDEEP

    24576:xF9PwmrNil0S0QdMDqShlm+s4gp82VCXyeGkGX9u3OVFcnJBCIJCxG:xF9AeGkGX9ueS3tCk

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ba7a1a3422bb3d28c675e0ad089f030_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0ba7a1a3422bb3d28c675e0ad089f030_NeikiAnalytics.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    PID:3080
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1304,i,2607710392823067546,4648797561512801463,262144 --variations-seed-version --mojo-platform-channel-handle=4456 /prefetch:8
    1⤵
      PID:4856

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\0ba7a1a3422bb3d28c675e0ad089f030_NeikiAnalytics.INI

      Filesize

      212B

      MD5

      63e33e6f5419c46c3fe2d46a25e5c8b8

      SHA1

      824621cc69fdba2892ac9c963ff747410e4a4af5

      SHA256

      87cf8c703fb32ca6a0bb03e5f28d42dbe2e3baeaff2c493bfaad4a07d5e71185

      SHA512

      c32b2382ab55b6803aa6a9496b8702486be507751e7e29630681f82f0e9123c6a8770d887de8d538f766cb16a86d8a1a63f3b7aeedfbb705e5542e2a6a1bc1f6