Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 06:43
Static task
static1
Behavioral task
behavioral1
Sample
95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe
-
Size
1.4MB
-
MD5
95a1a9a8c90906d1b8e53306bd1a9860
-
SHA1
5dea1be886812677f9790b4440ce1646ebc208e4
-
SHA256
0035ad2f5b6b7015b8c76e127b0e42a1c5dd53480a5d0d14677888c91e30f070
-
SHA512
4601de979589d8f84f7c0424e98caa54df8fc8a170d8641966a0c1fa71647e1ce46cb1c36cf34000618ddb85a58513cab0f06adb3152da5191969e806067b99d
-
SSDEEP
24576:TVYfch9rDDS1QMSAiBHBKfMSe5/aLW97yFFlX6Bjh2sBeW6h2g4c:TOfUvXMeZSjmjhV9
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2180 95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2180 95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe 2180 95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe 2180 95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe 2180 95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2180 95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe 2180 95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe 2180 95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe 2180 95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2180 95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe 2180 95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ddc705c2625e1fa77c2eb11a26947379
SHA180fbbe97687eaa0bf043878c5f1cc4cdb40486d0
SHA256caa53019f602d14266bbd5ae5b68cc672767bcd4855e57437fa1220e5c704d15
SHA5129961f978b17e4530af7a4ed0265e55b1a89f7ca8d24daa97fcbe90bd2e94fc4e54fb1b69b2e57107d66d3f5b9266b5a36d36d8103417dfceb68029e73289ab81
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
8KB
MD5eb496416498936ec2a45e73544e6a03d
SHA19f3d6ce685bdf3e11d2a9db1d6dd3fa734b19967
SHA256f5d0615d6844bb2611d081475cc814ea7173c04cb08ae0eb9389cfc7b8447e2b
SHA5120a2772c12125abaffe49e510f2e097443f58bd1b7f175c656251b88864e40668cd854443bf8478c0985601f13592f29bdddcbd3a949c95de05643e355c0153ff