Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 06:43
Static task
static1
Behavioral task
behavioral1
Sample
95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe
-
Size
1.4MB
-
MD5
95a1a9a8c90906d1b8e53306bd1a9860
-
SHA1
5dea1be886812677f9790b4440ce1646ebc208e4
-
SHA256
0035ad2f5b6b7015b8c76e127b0e42a1c5dd53480a5d0d14677888c91e30f070
-
SHA512
4601de979589d8f84f7c0424e98caa54df8fc8a170d8641966a0c1fa71647e1ce46cb1c36cf34000618ddb85a58513cab0f06adb3152da5191969e806067b99d
-
SSDEEP
24576:TVYfch9rDDS1QMSAiBHBKfMSe5/aLW97yFFlX6Bjh2sBeW6h2g4c:TOfUvXMeZSjmjhV9
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3168 95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3168 95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe 3168 95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe 3168 95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe 3168 95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 3168 95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe 3168 95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe 3168 95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe 3168 95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3168 95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe 3168 95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\95a1a9a8c90906d1b8e53306bd1a9860_NeikiAnalytics.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5eb496416498936ec2a45e73544e6a03d
SHA19f3d6ce685bdf3e11d2a9db1d6dd3fa734b19967
SHA256f5d0615d6844bb2611d081475cc814ea7173c04cb08ae0eb9389cfc7b8447e2b
SHA5120a2772c12125abaffe49e510f2e097443f58bd1b7f175c656251b88864e40668cd854443bf8478c0985601f13592f29bdddcbd3a949c95de05643e355c0153ff