Analysis
-
max time kernel
66s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 09:00
Behavioral task
behavioral1
Sample
b58804265808bf73ad4eb3e0d510f490_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
b58804265808bf73ad4eb3e0d510f490_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
windows10-2004-x64
11 signatures
150 seconds
General
-
Target
b58804265808bf73ad4eb3e0d510f490_NeikiAnalytics.exe
-
Size
130KB
-
MD5
b58804265808bf73ad4eb3e0d510f490
-
SHA1
272794ba4a05469e5eb5c563979031af08ead4ca
-
SHA256
4a3cc1cbc426429efc7531a88f2e76509dbb35d5a397ea4ce450e072008ac021
-
SHA512
523e52e4e4ceca15fd18af4385386f8b4604375fa48db5b120558b89b81cf46c9f9e29a78c9c09d88f20a28b76061ca68b96cfd2d6aaa1c5fb9a0bc537750e34
-
SSDEEP
1536:eH1ZaQvR1KiX3NK6I+hZhYrt/w5Q6G6IpiRYzz9qJHhhnm0yG5aP/5UROXTmZM:SKQJcinxphkG5Q6GdpIOkJHhKRyOXKe
Score
7/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1932-0-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1932-125-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1932-464167-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
b58804265808bf73ad4eb3e0d510f490_NeikiAnalytics.exepid process 1932 b58804265808bf73ad4eb3e0d510f490_NeikiAnalytics.exe