Analysis

  • max time kernel
    92s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 16:42

General

  • Target

    927afc36f206a558867e74ff40a24b90_NeikiAnalytics.exe

  • Size

    1.3MB

  • MD5

    927afc36f206a558867e74ff40a24b90

  • SHA1

    9b843fe50b64d9af176d6fc65cc0a8468f6b1214

  • SHA256

    71ae5bceb6a444f3a3ff49babd8bd2060d71a7f5a1c2337ac5b3381a25d8db21

  • SHA512

    73e058d741d1f2914855cd056d8a9cc9073dcd505c8c4e895ef47cc4a44e220a4c33e90b0f8e7809e1710f21537fe2925d0e518b102fbf797a0865b8978eb5a1

  • SSDEEP

    24576:K9L0zo08awpx9V4RoBJyFb2526oQcp5nlW1SB9mVq23p1:KL0zoTEAyFbSQPnlbB9mVq23P

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\927afc36f206a558867e74ff40a24b90_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\927afc36f206a558867e74ff40a24b90_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4932

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\LOG.TXT

    Filesize

    442B

    MD5

    d80fb03ff887b6ef1f79919b3efdf3fd

    SHA1

    f219a884f91230cb9726c4c45cf7a04fb968d19e

    SHA256

    8ad819d8a63fd1be79b3fc98affa4edcbade0d08e504aed81299a0a9c87d3cc7

    SHA512

    92bee68a729085ea61432c6d3cf871640c53ed6cbde2cad0959cd5abb191d102abda5a95f963e830dcb625ec7754a8a63447cbe63ca8b672ccdf0163e3fc67d0