Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-05-2024 06:43

General

  • Target

    95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe

  • Size

    1.4MB

  • MD5

    95a1a9a8c90906d1b8e53306bd1a9860

  • SHA1

    5dea1be886812677f9790b4440ce1646ebc208e4

  • SHA256

    0035ad2f5b6b7015b8c76e127b0e42a1c5dd53480a5d0d14677888c91e30f070

  • SHA512

    4601de979589d8f84f7c0424e98caa54df8fc8a170d8641966a0c1fa71647e1ce46cb1c36cf34000618ddb85a58513cab0f06adb3152da5191969e806067b99d

  • SSDEEP

    24576:TVYfch9rDDS1QMSAiBHBKfMSe5/aLW97yFFlX6Bjh2sBeW6h2g4c:TOfUvXMeZSjmjhV9

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:3168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Temp\$h~7E8B.tmp

    Filesize

    8KB

    MD5

    eb496416498936ec2a45e73544e6a03d

    SHA1

    9f3d6ce685bdf3e11d2a9db1d6dd3fa734b19967

    SHA256

    f5d0615d6844bb2611d081475cc814ea7173c04cb08ae0eb9389cfc7b8447e2b

    SHA512

    0a2772c12125abaffe49e510f2e097443f58bd1b7f175c656251b88864e40668cd854443bf8478c0985601f13592f29bdddcbd3a949c95de05643e355c0153ff

  • memory/3168-0-0x0000000000660000-0x0000000000661000-memory.dmp

    Filesize

    4KB

  • memory/3168-34-0x0000000000400000-0x000000000057B000-memory.dmp

    Filesize

    1.5MB

  • memory/3168-36-0x0000000000660000-0x0000000000661000-memory.dmp

    Filesize

    4KB